Microsoft IIS query.asp Direct Request Remote DoS

medium Nessus Plugin ID 10003

Synopsis

The remote web server is prone to a denial of service attack.

Description

The remote instance of IIS includes the sample site 'ExAir'. By calling one of the included Active Server Pages, specifically '/iissamples/exair/search/query.asp', an unauthenticated, remote attacker may be cause the web server to hang for up to 90 seconds (the default script timeout) if the default ExAir page and associated DLLs have not been loaded into the IIS memory space. This can be used to render the site unusable.

Solution

Delete the 'ExAir' sample IIS site.

See Also

https://seclists.org/bugtraq/1999/Jan/319

Plugin Details

Severity: Medium

ID: 10003

File Name: ExAir_dos_query.nasl

Version: 1.49

Type: remote

Family: CGI abuses

Published: 6/22/1999

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport, www/ASP

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1/26/1999

Reference Information

CVE: CVE-1999-0449

BID: 193