First published: Mon Apr 22 2002(Updated: )
The w3svc.dll ISAPI filter in Front Page Server Extensions and ASP.NET for Internet Information Server (IIS) 4.0, 5.0, and 5.1 does not properly handle the error condition when a long URL is provided, which allows remote attackers to cause a denial of service (crash) when the URL parser accesses a null pointer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Information Services | =4.0 | |
Microsoft Internet Information Services (IIS) | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2002-0072 is classified as high due to its potential to cause a denial of service.
To fix CVE-2002-0072, it is recommended to upgrade to a version of Internet Information Server that is not affected or to implement proper input validation on URLs.
CVE-2002-0072 affects Internet Information Services 4.0, 5.0, and 5.1.
CVE-2002-0072 can be exploited by sending specially crafted long URLs that cause the w3svc.dll ISAPI filter to crash.
While there are no specific workarounds for CVE-2002-0072, limiting the maximum length of URLs may help in mitigating the risk.