CVE-2017-7269

Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
References
Link Resource
http://www.securityfocus.com/bid/97127 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038168 Broken Link Third Party Advisory VDB Entry
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html Exploit Third Party Advisory
https://github.com/danigargu/explodingcan Exploit
https://github.com/edwardz246003/IIS_exploit Broken Link Third Party Advisory
https://github.com/rapid7/metasploit-framework/pull/8162 Issue Tracking Patch
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 Exploit
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server Broken Link Patch Vendor Advisory
https://www.exploit-db.com/exploits/41738/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41992/ Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/97127 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038168 Broken Link Third Party Advisory VDB Entry
https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html Exploit Third Party Advisory
https://github.com/danigargu/explodingcan Exploit
https://github.com/edwardz246003/IIS_exploit Broken Link Third Party Advisory
https://github.com/rapid7/metasploit-framework/pull/8162 Issue Tracking Patch
https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 Exploit
https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server Broken Link Patch Vendor Advisory
https://www.exploit-db.com/exploits/41738/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/41992/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:r2:*:*:*:*:*:*:*

History

14 Mar 2025, 20:33

Type Values Removed Values Added
First Time Microsoft internet Information Services
CPE cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*

21 Nov 2024, 03:31

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/97127 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97127 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038168 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038168 - Broken Link, Third Party Advisory, VDB Entry
References () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - Exploit, Third Party Advisory () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - Exploit, Third Party Advisory
References () https://github.com/danigargu/explodingcan - Exploit () https://github.com/danigargu/explodingcan - Exploit
References () https://github.com/edwardz246003/IIS_exploit - Broken Link, Third Party Advisory () https://github.com/edwardz246003/IIS_exploit - Broken Link, Third Party Advisory
References () https://github.com/rapid7/metasploit-framework/pull/8162 - Issue Tracking, Patch () https://github.com/rapid7/metasploit-framework/pull/8162 - Issue Tracking, Patch
References () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - Exploit () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - Exploit
References () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - Broken Link, Patch, Vendor Advisory () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - Broken Link, Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/41738/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41738/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/41992/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/41992/ - Exploit, Third Party Advisory, VDB Entry

25 Jul 2024, 14:01

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/97127 - () http://www.securityfocus.com/bid/97127 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038168 - () http://www.securitytracker.com/id/1038168 - Broken Link, Third Party Advisory, VDB Entry
References () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - () https://0patch.blogspot.com/2017/03/0patching-immortal-cve-2017-7269.html - Exploit, Third Party Advisory
References () https://github.com/danigargu/explodingcan - () https://github.com/danigargu/explodingcan - Exploit
References () https://github.com/edwardz246003/IIS_exploit - Third Party Advisory () https://github.com/edwardz246003/IIS_exploit - Broken Link, Third Party Advisory
References () https://github.com/rapid7/metasploit-framework/pull/8162 - () https://github.com/rapid7/metasploit-framework/pull/8162 - Issue Tracking, Patch
References () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - () https://medium.com/%40iraklis/number-of-internet-facing-vulnerable-iis-6-0-to-cve-2017-7269-8bd153ef5812 - Exploit
References () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - () https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server - Broken Link, Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/41738/ - () https://www.exploit-db.com/exploits/41738/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/41992/ - () https://www.exploit-db.com/exploits/41992/ - Exploit, Third Party Advisory, VDB Entry
CWE CWE-119 CWE-120
CPE cpe:2.3:o:microsoft:windows_server_2003:-:r2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2003:r2:*:*:*:*:*:*:*

Information

Published : 2017-03-27 02:59

Updated : 2025-03-14 20:33


NVD link : CVE-2017-7269

Mitre link : CVE-2017-7269

CVE.ORG link : CVE-2017-7269


JSON object : View

Products Affected

microsoft

  • windows_server_2003
  • internet_information_services
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')