Vulnerability Note VU#630531

Microsoft Internet Information Server (IIS) vulnerable to buffer overflow via malformed server-side include directive

Original Release date: 13 Jul 2002 | Last revised: 13 Jul 2002


A buffer overflow in the code that processes server-side include files on IIS 4.0 and IIS 5.0 could allow an intruder to execute code with the privileges of the web server.


A buffer overflow exists in the code that processes server side include directives on IIS versions 4 and 5. An intruder who can create or modify files on the web server can subsequently use this buffer overflow to execute arbitrary code with the privileges of the web server. Quoting from Microsoft Security Bulletin MS01-044:

A buffer overrun vulnerability involving the code that performs server-side include (SSI) directives. An attacker who had the ability to place content onto a server could include a malformed SSI directive that, when the content was processed, would result in code of the attacker’s choice running in Local System context.

Under ordinary circumstances, only web administrators would be able to create or modify the necessary files.


An intruder can execute arbitrary code with the privileges of the web server.


Apply a patch as described in Alternately, Microsoft has indicated this issue will be addressed in Windows 2000 service pack 3.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-13 Jul 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to the NSFocus Team for reporting this vulnerability and to Microsoft for the information contained in their bulletin.

This document was written by Shawn V Hernan.

Other Information

  • CVE IDs: CAN-2001-0506
  • Date Public: 15 Aug 2001
  • Date First Published: 13 Jul 2002
  • Date Last Updated: 13 Jul 2002
  • Severity Metric: 12.66
  • Document Revision: 12


If you have feedback, comments, or additional information about this vulnerability, please send us email.