CVE-2001-0507

HIGH
2001-09-20 [email protected]
7.2
CVSS 2.0
Share

CVSS VectorNVD

AV:L/AC:L/Au:N/C:C/I:C/A:C
Attack Vector
Local
Attack Complexity
Low
Confidentiality
C
Integrity
C
Availability
C

Lifecycle Timeline

5
Analysis Updated
Apr 16, 2026 - 00:57 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 16, 2026 - 00:50 vuln.today
cvss_changed
Analysis Generated
Mar 26, 2026 - 11:17 vuln.today
PoC Detected
Apr 03, 2025 - 01:03 vuln.today
Public exploit code
CVE Published
Sep 20, 2001 - 04:00 nvd
HIGH 7.2

DescriptionNVD

IIS 5.0 uses relative paths to find system files that will run in-process, which allows local users to gain privileges via a Trojan horse file, aka the "System file listing privilege elevation" vulnerability.

AnalysisAI

Local privilege escalation in Microsoft Internet Information Services 5.0 allows authenticated local users to execute arbitrary code with SYSTEM privileges by placing malicious DLLs in search path locations that IIS uses to load in-process components. Publicly available exploit code exists. EPSS score of 2.16% (84th percentile) indicates lower exploitation probability, consistent with the local attack vector requiring pre-existing system access. Addressed by Microsoft MS01-044 security bulletin in 2001.

Technical ContextAI

Microsoft Internet Information Services 5.0, shipped with Windows 2000, uses relative path resolution when loading system DLLs and executables that run within the IIS process context (w3wp.exe or inetinfo.exe). When searching for required system files, IIS follows the Windows DLL search order, which checks the application directory before system directories. This insecure library loading behavior creates a DLL hijacking opportunity where local attackers can plant malicious files with names matching legitimate IIS components in directories earlier in the search path. Because IIS runs with LocalSystem privileges to manage web services, any code loaded into its process inherits these elevated privileges, enabling complete system compromise from an unprivileged local account.

RemediationAI

Apply the security update provided in Microsoft Security Bulletin MS01-044 (https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-044), which modifies IIS 5.0 to use absolute paths when loading system components, eliminating the relative path resolution vulnerability. Given that Windows 2000 and IIS 5.0 reached end-of-life in July 2010, Microsoft no longer provides security updates for these products. Organizations still running IIS 5.0 should prioritize migration to currently supported web server platforms (IIS 10.0 on Windows Server 2019/2022, nginx, Apache) rather than attempting to patch 23-year-old software. If immediate migration is not feasible, implement defense-in-depth controls: restrict local logon rights to only essential administrative accounts using Group Policy, enable filesystem auditing to detect unauthorized file placement in IIS directories (inetpub, system32, Windows directories in IIS search path), implement application whitelisting to prevent execution of unauthorized DLLs, and isolate IIS 5.0 systems on network segments with strict access controls. Note that these compensating controls do not eliminate the vulnerability but reduce attack surface by limiting who can exploit it.

Share

CVE-2001-0507 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy