VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-091225-001
Microsoft IIS File Extension Processing Security Bypass Vulnerability
http://www.vupen.com/english/advisories/2009/3634

A vulnerability has been identified in Microsoft Internet Information Services (IIS), which could be exploited by attackers to compromise a vulnerable system. This issue is caused due to the server handling files with multiple extensions separated by the ";" character e.g. "malicious.asp;.jpg" as ASP pages, which could allow attackers to execute arbitrary code on a vulnerable web server by uploading a malicious file bypassing file extension protections and restrictions.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-12-25
Source Information Category:
Other (news, forums, etc.)
Last Updated:
2009-12-25




Affected Product Tags
cpe:/a:microsoft:internet_information_server     (Microsoft IIS)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
X Low [?]

Medium [?]
High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
X Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

X Standard [?]
Limited [?]
None or Unnecessary [?]

[User Interaction Required] [?]
X Complex [?]

Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
X None [?]

[Incident Activity] [?]
X None [?]

Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2009 JPCERT/CC All Rights Reserved.