CVE-2000-0167: IIS Inetinfo.exe allows local users to cause a denial of service by creating a mail file with a long
IIS Inetinfo.exe allows local users to cause a denial of service by creating a mail file with a long name and a .txt.eml extension in the pickup directory.
AI Analysis
Technical Summary
CVE-2000-0167 is a vulnerability affecting Microsoft Internet Information Server (IIS) version 4.0, specifically related to the Inetinfo.exe process. Inetinfo.exe is a core IIS component responsible for various server functions, including handling mail pickup directories. The vulnerability arises when a local user creates a mail file with an excessively long filename and a .txt.eml extension within the mail pickup directory. This action triggers a denial of service (DoS) condition by causing the Inetinfo.exe process to malfunction or crash, thereby disrupting the mail service functionality hosted by IIS. The vulnerability requires local access to the server, meaning an attacker must already have some level of access to the system to exploit it. The CVSS score is 2.1, reflecting a low severity primarily due to the local access requirement and the limited impact scope, which affects availability only without compromising confidentiality or integrity. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 2000) and the affected product version (IIS 4.0), which is obsolete and unsupported, this vulnerability is unlikely to be encountered in modern environments. However, legacy systems still running IIS 4.0 could be susceptible to this denial of service condition if local users are untrusted or compromised.
Potential Impact
For European organizations, the impact of CVE-2000-0167 is generally low due to the obsolescence of IIS 4.0 and the requirement for local user access to exploit the vulnerability. However, organizations that maintain legacy systems or have not upgraded from IIS 4.0 could face service disruptions if an attacker or malicious insider creates specially crafted mail files in the pickup directory. This could lead to temporary denial of mail services, affecting internal communications or automated mail processing workflows. The impact on confidentiality and integrity is negligible, but availability is affected. In regulated industries or critical infrastructure sectors where legacy systems might still be in use, even a low-severity DoS could have operational consequences. Additionally, if legacy IIS servers are part of a larger network, disruption could cascade to dependent services. Overall, the threat is limited but should not be ignored in environments where IIS 4.0 remains operational.
Mitigation Recommendations
Given that no official patch is available for this vulnerability, mitigation should focus on compensating controls and system hardening. Organizations should: 1) Upgrade IIS to a supported and patched version to eliminate exposure to this and other legacy vulnerabilities. 2) Restrict local user access on servers running IIS 4.0 to trusted administrators only, minimizing the risk of malicious file creation. 3) Monitor the mail pickup directory for anomalous file creation, especially files with long names and .txt.eml extensions, using file integrity monitoring tools or custom scripts. 4) Implement strict file system permissions on the pickup directory to prevent unauthorized file creation or modification. 5) Consider isolating legacy IIS servers in segmented network zones with limited access to reduce the attack surface. 6) Regularly audit legacy systems and plan for decommissioning or migration to modern platforms to reduce long-term risk.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland
CVE-2000-0167: IIS Inetinfo.exe allows local users to cause a denial of service by creating a mail file with a long
Description
IIS Inetinfo.exe allows local users to cause a denial of service by creating a mail file with a long name and a .txt.eml extension in the pickup directory.
AI-Powered Analysis
Technical Analysis
CVE-2000-0167 is a vulnerability affecting Microsoft Internet Information Server (IIS) version 4.0, specifically related to the Inetinfo.exe process. Inetinfo.exe is a core IIS component responsible for various server functions, including handling mail pickup directories. The vulnerability arises when a local user creates a mail file with an excessively long filename and a .txt.eml extension within the mail pickup directory. This action triggers a denial of service (DoS) condition by causing the Inetinfo.exe process to malfunction or crash, thereby disrupting the mail service functionality hosted by IIS. The vulnerability requires local access to the server, meaning an attacker must already have some level of access to the system to exploit it. The CVSS score is 2.1, reflecting a low severity primarily due to the local access requirement and the limited impact scope, which affects availability only without compromising confidentiality or integrity. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 2000) and the affected product version (IIS 4.0), which is obsolete and unsupported, this vulnerability is unlikely to be encountered in modern environments. However, legacy systems still running IIS 4.0 could be susceptible to this denial of service condition if local users are untrusted or compromised.
Potential Impact
For European organizations, the impact of CVE-2000-0167 is generally low due to the obsolescence of IIS 4.0 and the requirement for local user access to exploit the vulnerability. However, organizations that maintain legacy systems or have not upgraded from IIS 4.0 could face service disruptions if an attacker or malicious insider creates specially crafted mail files in the pickup directory. This could lead to temporary denial of mail services, affecting internal communications or automated mail processing workflows. The impact on confidentiality and integrity is negligible, but availability is affected. In regulated industries or critical infrastructure sectors where legacy systems might still be in use, even a low-severity DoS could have operational consequences. Additionally, if legacy IIS servers are part of a larger network, disruption could cascade to dependent services. Overall, the threat is limited but should not be ignored in environments where IIS 4.0 remains operational.
Mitigation Recommendations
Given that no official patch is available for this vulnerability, mitigation should focus on compensating controls and system hardening. Organizations should: 1) Upgrade IIS to a supported and patched version to eliminate exposure to this and other legacy vulnerabilities. 2) Restrict local user access on servers running IIS 4.0 to trusted administrators only, minimizing the risk of malicious file creation. 3) Monitor the mail pickup directory for anomalous file creation, especially files with long names and .txt.eml extensions, using file integrity monitoring tools or custom scripts. 4) Implement strict file system permissions on the pickup directory to prevent unauthorized file creation or modification. 5) Consider isolating legacy IIS servers in segmented network zones with limited access to reduce the attack surface. 6) Regularly audit legacy systems and plan for decommissioning or migration to modern platforms to reduce long-term risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32db6fd31d6ed7df830
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 3:39:54 AM
Last updated: 8/17/2025, 8:14:57 AM
Views: 18
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.