Microsoft W3Who ISAPI w3who.dll Multiple Remote Vulnerabilities

critical Nessus Plugin ID 15910

Synopsis

It is possible to execute code on the remote host.

Description

The Windows 2000 Resource Kit ships with a DLL that displays the browser client context. It lists security identifiers, privileges and $ENV variables.

Nessus has determined that this file is installed on the remote host.

The w3who.dll ISAPI may allow an attacker to execute arbitrary commands on this host, through a buffer overflow, or to mount cross-site scripting attacks.

Solution

Delete this file.

See Also

https://seclists.org/fulldisclosure/2004/Dec/174

Plugin Details

Severity: Critical

ID: 15910

File Name: w3who_dll.nasl

Version: 1.24

Type: remote

Family: CGI abuses

Published: 12/6/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/6/2004

Exploitable With

CANVAS (CANVAS)

Metasploit (Microsoft IIS ISAPI w3who.dll Query String Overflow)

Reference Information

CVE: CVE-2004-1133, CVE-2004-1134

BID: 11820

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990