Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0304: Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to

0
Medium
VulnerabilityCVE-2000-0304cve-2000-0304denial of service
Published: Wed May 10 2000 (05/10/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: internet_information_server

Description

Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to cause a denial of service via a malformed request to the inetinfo.exe program, aka the "Undelimited .HTR Request" vulnerability.

AI-Powered Analysis

AILast updated: 06/19/2025, 19:35:10 UTC

Technical Analysis

CVE-2000-0304 is a vulnerability affecting Microsoft Internet Information Services (IIS) versions 4.0 and 5.0 when the IISADMPWD virtual directory is installed. This virtual directory is typically used to allow users to change their passwords via a web interface. The vulnerability arises from the way the inetinfo.exe process handles malformed HTTP requests, specifically those targeting the .HTR files used by the IISADMPWD directory. An attacker can craft a specially malformed request that is not properly delimited, causing the inetinfo.exe process to crash or become unresponsive, resulting in a denial of service (DoS) condition. This vulnerability does not allow for unauthorized access or data compromise but impacts the availability of the web server. The attack vector is network-based, requiring no authentication or user interaction, and can be executed remotely. The CVSS base score is 5.0 (medium severity), reflecting the ease of exploitation and the impact limited to availability. Microsoft has released patches to address this issue, as documented in their security bulletin MS00-031. No known exploits have been observed in the wild, but unpatched systems remain vulnerable to potential DoS attacks that could disrupt web services relying on IIS 4.0 or 5.0 with the IISADMPWD directory enabled.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of web services hosted on IIS 4.0 or 5.0 servers with the IISADMPWD virtual directory enabled. This could affect internal or external-facing web applications, particularly those that rely on IIS for user authentication or password management. The denial of service could lead to temporary loss of availability, impacting business operations, customer access, and internal workflows. While the vulnerability does not compromise confidentiality or integrity, the availability impact could be significant for organizations with critical web infrastructure or those in sectors where uptime is essential, such as finance, healthcare, and government services. Additionally, organizations that have not updated legacy systems or have not disabled the IISADMPWD directory remain at risk. Given the age of the vulnerability, it is less likely to affect modern environments but could still pose risks in legacy or poorly maintained systems.

Mitigation Recommendations

1. Apply the official Microsoft patches provided in security bulletin MS00-031 immediately to all affected IIS 4.0 and 5.0 servers. 2. If patching is not immediately possible, disable or remove the IISADMPWD virtual directory to eliminate the attack surface. 3. Restrict network access to IIS servers, especially limiting exposure of the IISADMPWD directory to untrusted networks or the internet. 4. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect and block malformed HTTP requests targeting .HTR files. 5. Monitor IIS server logs for unusual or malformed requests that could indicate exploitation attempts. 6. Consider upgrading to supported versions of IIS and Windows Server to reduce exposure to legacy vulnerabilities. 7. Conduct regular vulnerability assessments and penetration testing focused on legacy systems to identify and remediate similar risks.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7dfabf

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/19/2025, 7:35:10 PM

Last updated: 2/7/2026, 12:29:30 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats