Skip to main content

CVE-2000-0115: IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basi

Medium
VulnerabilityCVE-2000-0115cve-2000-0115denial of service
Published: Fri Jan 21 2000 (01/21/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: internet_information_server

Description

IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basic script in an ASP page.

AI-Powered Analysis

AILast updated: 07/01/2025, 06:41:35 UTC

Technical Analysis

CVE-2000-0115 is a vulnerability in Microsoft Internet Information Server (IIS) that allows local users to cause a denial of service (DoS) condition by leveraging invalid regular expressions within Visual Basic scripts embedded in ASP pages. Specifically, the issue arises when IIS processes ASP pages containing Visual Basic scripts that use malformed regular expressions. These invalid expressions can cause the scripting engine or the server process to hang or crash, leading to service unavailability. The vulnerability requires local user access, meaning the attacker must have some level of access to the server to exploit it. The CVSS score of 5.0 (medium severity) reflects that the impact is limited to availability, with no confidentiality or integrity impact, and no authentication is required beyond local access. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of this vulnerability (published in 2000), it primarily affects legacy IIS installations that have not been updated or replaced. Modern IIS versions and Windows Server editions have addressed this issue through improved scripting engine robustness and input validation.

Potential Impact

For European organizations, the impact of this vulnerability is primarily a localized denial of service on affected IIS servers. If exploited, it could cause temporary unavailability of web services hosted on vulnerable IIS instances, potentially disrupting business operations, customer access, or internal applications relying on IIS. However, since exploitation requires local user access, the risk of remote exploitation is minimal, reducing the likelihood of widespread impact. Organizations running legacy IIS versions in critical environments, such as government portals, healthcare systems, or financial services, could face operational disruptions if an insider or attacker with local access triggers this vulnerability. Additionally, unpatched legacy systems may be more prevalent in smaller organizations or those with limited IT resources, increasing their exposure. Overall, the threat is moderate and mostly relevant to environments where legacy IIS servers are still in use without proper access controls or system hardening.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading or migrating legacy IIS servers to supported, modern versions of Microsoft IIS and Windows Server that have addressed this issue. If upgrading is not immediately feasible, organizations should enforce strict access controls to limit local user access to IIS servers, ensuring only trusted administrators have such privileges. Implementing application whitelisting and monitoring for unusual scripting activity can help detect attempts to exploit malformed regular expressions. Additionally, disabling or restricting the use of Visual Basic scripting in ASP pages, or migrating to more secure web application frameworks, can reduce the attack surface. Regular security audits and vulnerability assessments should be conducted to identify legacy IIS instances and ensure compliance with security policies. Since no patches are available for this specific vulnerability, these compensating controls are critical to risk reduction.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df778

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 6:41:35 AM

Last updated: 7/31/2025, 8:29:50 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats