Vulnerability Note VU#829845

Microsoft Windows 2000 Indexing Services enumerates local file locations via ixsso.query ActiveX object

Original Release date: 27 Sep 2002 | Last revised: 27 Sep 2002


Index Server 2.0 and the Indexing Service 3.0 contain a vulnerability that may allow remote intruders to gain information about files on the local computer.


Index Server 2.0 and Indexing Service 3.0 are services that allow information about local files to be queried via a web interface. Normally, this capability would only be available through the server, but the software includes an ActiveX control that is incorrectly marked safe-for-scripting. As a result, an remote attacker could gain information about files on a user's comuter when they view a malicious web page. The indexing service does not need to be running for the attacker to use the ActiveX control.


When a user views a malicious web page that invokes the vulnerable control, the web page author may be able to gain information about files on the victim's computer. This information includes the names and properties of existing files. If the indexing server is also running, the attacker may be able to gain information about which files contain attacker selected keywords.


Apply a Patch

Microsoft has published patches correcting this vulnerability. The patches are listed in their advisory at:

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-16 Jul 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Georgi Guninski discovered this vulnerability.

This document was written by Cory F. Cohen.

Other Information

  • CVE IDs: CAN-2000-1105
  • Date Public: 10 Nov 2000
  • Date First Published: 27 Sep 2002
  • Date Last Updated: 27 Sep 2002
  • Severity Metric: 8.10
  • Document Revision: 10


If you have feedback, comments, or additional information about this vulnerability, please send us email.