The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.
Exploitability Analysis: Network
A vulnerability exploitable with network access means the vulnerable software is bound to
the network stack and the attacker does not require local network access or local access.
Such a vulnerability is often termed “remotely exploitable”. An example of a network
attack is an RPC buffer overflow.
Exploitability Complexity: Low
Specialized access conditions or extenuating circumstances do not exist. The following are examples:
The affected product typically requires access to a wide range of systems and users, possibly anonymous an untrusted (e.g., Internet-facing web or mail server).
The affected configuration is default or ubiquitous. The attack can be performed manually and requires little skill or additional information gathering.
The 'race condition' is a lazy one (i.e., it is technically a race but easily winnable).
Authentication is not required to access and exploit the vulnerability.
Confidentiality Impact: None
There is no impact to the confidentiality of the system.
Integrity Impact: None
There is no impact to the integrity of the system.
Availability Impact: Complete
There is a total shutdown of the affected resource. The attacker can render the
resource completely unavailable.