CVE-2000-0304: Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to
Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to cause a denial of service via a malformed request to the inetinfo.exe program, aka the "Undelimited .HTR Request" vulnerability.
AI Analysis
Technical Summary
CVE-2000-0304 is a vulnerability affecting Microsoft Internet Information Services (IIS) versions 4.0 and 5.0 when the IISADMPWD virtual directory is installed. This virtual directory is typically used to allow users to change their passwords via a web interface. The vulnerability arises from the way the inetinfo.exe process handles malformed HTTP requests, specifically those targeting the .HTR files used by the IISADMPWD directory. An attacker can craft a specially malformed request that is not properly delimited, causing the inetinfo.exe process to crash or become unresponsive, resulting in a denial of service (DoS) condition. This vulnerability does not allow for unauthorized access or data compromise but impacts the availability of the web server. The attack vector is network-based, requiring no authentication or user interaction, and can be executed remotely. The CVSS base score is 5.0 (medium severity), reflecting the ease of exploitation and the impact limited to availability. Microsoft has released patches to address this issue, as documented in their security bulletin MS00-031. No known exploits have been observed in the wild, but unpatched systems remain vulnerable to potential DoS attacks that could disrupt web services relying on IIS 4.0 or 5.0 with the IISADMPWD directory enabled.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of web services hosted on IIS 4.0 or 5.0 servers with the IISADMPWD virtual directory enabled. This could affect internal or external-facing web applications, particularly those that rely on IIS for user authentication or password management. The denial of service could lead to temporary loss of availability, impacting business operations, customer access, and internal workflows. While the vulnerability does not compromise confidentiality or integrity, the availability impact could be significant for organizations with critical web infrastructure or those in sectors where uptime is essential, such as finance, healthcare, and government services. Additionally, organizations that have not updated legacy systems or have not disabled the IISADMPWD directory remain at risk. Given the age of the vulnerability, it is less likely to affect modern environments but could still pose risks in legacy or poorly maintained systems.
Mitigation Recommendations
1. Apply the official Microsoft patches provided in security bulletin MS00-031 immediately to all affected IIS 4.0 and 5.0 servers. 2. If patching is not immediately possible, disable or remove the IISADMPWD virtual directory to eliminate the attack surface. 3. Restrict network access to IIS servers, especially limiting exposure of the IISADMPWD directory to untrusted networks or the internet. 4. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect and block malformed HTTP requests targeting .HTR files. 5. Monitor IIS server logs for unusual or malformed requests that could indicate exploitation attempts. 6. Consider upgrading to supported versions of IIS and Windows Server to reduce exposure to legacy vulnerabilities. 7. Conduct regular vulnerability assessments and penetration testing focused on legacy systems to identify and remediate similar risks.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Ireland
CVE-2000-0304: Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to
Description
Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to cause a denial of service via a malformed request to the inetinfo.exe program, aka the "Undelimited .HTR Request" vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2000-0304 is a vulnerability affecting Microsoft Internet Information Services (IIS) versions 4.0 and 5.0 when the IISADMPWD virtual directory is installed. This virtual directory is typically used to allow users to change their passwords via a web interface. The vulnerability arises from the way the inetinfo.exe process handles malformed HTTP requests, specifically those targeting the .HTR files used by the IISADMPWD directory. An attacker can craft a specially malformed request that is not properly delimited, causing the inetinfo.exe process to crash or become unresponsive, resulting in a denial of service (DoS) condition. This vulnerability does not allow for unauthorized access or data compromise but impacts the availability of the web server. The attack vector is network-based, requiring no authentication or user interaction, and can be executed remotely. The CVSS base score is 5.0 (medium severity), reflecting the ease of exploitation and the impact limited to availability. Microsoft has released patches to address this issue, as documented in their security bulletin MS00-031. No known exploits have been observed in the wild, but unpatched systems remain vulnerable to potential DoS attacks that could disrupt web services relying on IIS 4.0 or 5.0 with the IISADMPWD directory enabled.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of web services hosted on IIS 4.0 or 5.0 servers with the IISADMPWD virtual directory enabled. This could affect internal or external-facing web applications, particularly those that rely on IIS for user authentication or password management. The denial of service could lead to temporary loss of availability, impacting business operations, customer access, and internal workflows. While the vulnerability does not compromise confidentiality or integrity, the availability impact could be significant for organizations with critical web infrastructure or those in sectors where uptime is essential, such as finance, healthcare, and government services. Additionally, organizations that have not updated legacy systems or have not disabled the IISADMPWD directory remain at risk. Given the age of the vulnerability, it is less likely to affect modern environments but could still pose risks in legacy or poorly maintained systems.
Mitigation Recommendations
1. Apply the official Microsoft patches provided in security bulletin MS00-031 immediately to all affected IIS 4.0 and 5.0 servers. 2. If patching is not immediately possible, disable or remove the IISADMPWD virtual directory to eliminate the attack surface. 3. Restrict network access to IIS servers, especially limiting exposure of the IISADMPWD directory to untrusted networks or the internet. 4. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect and block malformed HTTP requests targeting .HTR files. 5. Monitor IIS server logs for unusual or malformed requests that could indicate exploitation attempts. 6. Consider upgrading to supported versions of IIS and Windows Server to reduce exposure to legacy vulnerabilities. 7. Conduct regular vulnerability assessments and penetration testing focused on legacy systems to identify and remediate similar risks.
Patch Information
Threat ID: 682ca32db6fd31d6ed7dfabf
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 6/19/2025, 7:35:10 PM
Last updated: 2/7/2026, 12:29:30 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.