Buffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows attackers to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise."
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/4855 | vdb-entry x_refsource_BID |
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-028 | vendor-advisory x_refsource_MS |
| http://www.kb.cert.org/vuls/id/313819 | third-party-advisory x_refsource_CERT-VN |
| http://marc.info/?l=ntbugtraq&m=102392308608100&w=2 | mailing-list x_refsource_NTBUGTRAQ |
| http://www.iss.net/security_center/static/9327.php | vdb-entry x_refsource_XF |
| http://online.securityfocus.com/archive/1/276767 | mailing-list x_refsource_BUGTRAQ |
| http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0099.html | mailing-list x_refsource_VULNWATCH |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A182 | vdb-entry signature x_refsource_OVAL |
| http://marc.info/?l=bugtraq&m=102392069305962&w=2 | mailing-list x_refsource_BUGTRAQ |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A29 | vdb-entry signature x_refsource_OVAL |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|