[] NeoSense

Microsoft IIS 4.0 - ISAPI Buffer Overflow

Author: Marc Maiffret
type: local
platform: windows
port: 
date_added: 2000-11-06 
date_updated: 2012-08-13 
verified: 1 
codes: CVE-2000-1147;OSVDB-13759 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/1911/info

The ASP ISAPI file parser does not properly execute certain malformed ASP files that contain scripts with the LANGUAGE parameter containing a buffer of over 2200 characters and have the RUNAT value set as 'server'. Depending on the data entered into the buffer, a denial of service attack could be launched or arbitrary code could be executed under the SYSTEM privilege level in the event that a malicious ASP file were locally executed on IIS.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20383.zip