|
|||
Rule General Information |
---|
Release Date: | 2013-03-19 | |
Rule Name: | PROTOCOL-TELNET Microsoft IIS FTP Server Telnet IAC Buffer Overflow Vulnerability -2 (CVE-2010-3972) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | ExploitDB:15803 http://www.microsoft.com/technet/security/Bulletin/MS11-004.mspx SecurityFocusBID:45542 SecurityTrackerID:1024921 |
|
Solutions |
---|
Microsoft has released a patch MS11-004 to eliminate the vulnerability. The patch can be downloaded at http://www.microsoft.com/technet/security/Bulletin/MS11-004.mspx |