____________________________________________________________ \ / Scott Fosseen - Systems Engineer - Arrowhead AEA 5 \ www.aea5.k12.ia.us/aeaphone.nsf/Web/FosseenScott /____________________________________________________________ ----- Original Message ----- From: "X-Force" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, April 10, 2002 7:11 PM Subject: ISSalert: ISS Alert: Multiple Remote Vulnerabilities in Microsoft IIS
> > TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to > [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! > -------------------------------------------------------------------------- - > > -----BEGIN PGP SIGNED MESSAGE----- > > Internet Security Systems Security Alert > April 10, 2002 > > Multiple Remote Vulnerabilities in Microsoft IIS > > Synopsis: > > ISS X-Force has learned that Microsoft Internet Information Server (IIS) > is affected by ten new remote vulnerabilities. These vulnerabilities > vary in severity from mild to critical. A remote attacker may exploit > one or more of these vulnerabilities to cause a target Web server to > crash, execute arbitrary commands on the server, or gain complete > control of a target IIS server. > > Affected Versions: > > Microsoft Internet Information Server 4.0 > Microsoft Internet Information Server 5.0 > Microsoft Internet Information Server 5.1 > > Note: IIS 6.0 Beta build 3605 and earlier are also affected. > > Description: > > Microsoft released a Security Bulletin on April 10, 2002 detailing new > cumulative patches for IIS 4.0, 5.0, and 5.1. These patches contain all > previous security patches for each version as well as patches for ten > new vulnerabilities. > > Heap Buffer overflow in ASP chunked encoding routines > (CAN-2002-0079) > > ASP (Active Server Pages) is enabled on all IIS installations by > default. ASP is used to dynamically generate HTML pages on the server > and deliver them to a client. IIS improperly handles specially-crafted > chunked encoding queries to ASP pages. Chunked encoding is used in > situations when a client supplies the server with a variable amount of > information. If the client supplies data using chunked encoding, the > server dynamically allocates memory according to the size of each > incoming chunk. IIS improperly adds the sizes of these allocated chunks, > which may overwrite memory. Successful exploitation of this > vulnerability may crash a vulnerable server, allowing remote attackers > to execute arbitrary commands on the server with IWAM_computername > privileges. This account is equivalent to an unprivileged normal user. > This vulnerability affects IIS versions 4.0 and 5.0. > > Buffer overflow within the ASP data transfer mechanism > (CAN-2002-0147) > > This vulnerability is similar to the previous vulnerability and affects > IIS versions 4.0, 5.0, and 5.1. > > Buffer overflow in IIS HTTP header delimiter parsing > (CAN-2002-0150) > > It may be possible for remote attackers to create a special request to > bypass IIS delimiter parsing. IIS 4.0, 5.0, and 5.1 may incorrectly > parse this request and overflow a buffer, which may lead to a denial of > service attack or the ability to execute arbitrary code on the target > server with IWAM_computername privileges. > > Buffer overflow in IIS ASP Server-Side Include routines > (CAN-2002-0149) > > ASP scripts sometimes process external files in order to function > correctly. If an attacker sends a specific query to an overly long > filename, this name may be processed within the ASP script as a server- > side include (SSI). A buffer overflow may be triggered if the length of > the filename is longer than the static buffer within the SSI routine. > This vulnerability affects IIS 4.0, 5.0, and 5.1. Successful > exploitation of this vulnerability may crash the server or allow an > attacker to execute arbitrary code on the target server with > IWAM_computername privileges. > > > Buffer overflow in the HTR ISAPI extension > (CAN-2002-0071) > > HTR was the predecessor to ASP and is considered a legacy technology. > HTR remains in use today to handle password management in IIS. It may be > possible for an attacker to send a malformed HTR request to a vulnerable > IIS 4.0 or 5.0 server to cause a denial of service attack. An attacker > may also use this vulnerability to run arbitrary commands with > IWAM_computername privileges. HTR files need not be present on the > server for attackers to exploit this vulnerability. > > Denial of service caused by improper handling of error conditions in > ISAPI filters > (CAN-2002-0072) > > If vulnerable ISAPI filters within IIS 4.0, 5.0, and 5.1 receive a URL > of an illegal length, IIS will improperly rewrite the URL with a null > value and attempt to send the error back to the client that requested > the URL. Before the request is sent, IIS attempts to operate on the null > value, which causes a fault that crashes the server. > > Denial of service in the IIS 4.0, 5.0 and 5.1 FTP (File Transfer > Protocol) service > (CAN-2002-0073) > > IIS improperly handles specially-crafted status requests on current FTP > sessions. When an attacker sends this type of request to an IIS server, > it may lead to improper access of uninitialized memory, which may result > in a denial of service to FTP and Web services. > > Cross-Site Scripting (CSS) vulnerabilities present in IIS 4.0, 5.0 and > 5.1 > (CAN-2002-0074) > (CAN-2002-0148) > (CAN-2002-0075) > > CSS vulnerabilities rely on the ability of an attacker to lure users to > their rogue Web servers. When a user visits a specific page on a rogue > Web server, the request for the URL is relayed to a third-party site > using active scripting. If this third-party site is trusted by the user, > the attacker's Web site is trusted just like the third-party site, > inheriting that the same level of privilege. IIS contains CSS > vulnerabilities when searching IIS help files, viewing HTTP error pages, > and notifying a user when a request has been redirected. > > Recommendations: > > X-Force recommends that all affected IIS customers apply the following > Microsoft supplied patches immediately: > > Microsoft IIS 4.0: > http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37931 > Microsoft IIS 5.0: > http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37824 > Microsoft IIS 5.1: > http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37857 > > RealSecure Network Sensor may trigger several signatures in response to > the IIS attacks described in this advisory. RealSecure Network Sensor > administrators > should closely examine the following events if they are detected by > RealSecure. The list below details the signatures and their > corresponding vulnerabilities. > > HTTP_NCSA_BufferOverflow > (CAN-2002-0147) > > HTTP_NCSA_BufferOverflow > HTTP_Netscape_Method_Overflow > (CAN-2002-0149) > > HTTP_NCSA_BufferOverflow > (CAN-2002-0071) > > HTTP_Netscape_Method_Overflow > (CAN-2002-0072) > > FTP_Glob_Expansion > (CAN-2002-0073) > > BlackICE products currently detect potential exploitation of three of > the vulnerabilities > described in this advisory. BlackICE users and administrators should > closely examine the > following events if they are detected by BlackICE: > > FTP Command line overflow > (CAN-2002-0073) > > HTTP URL overflow > (CAN-2002-0149) > > IIS malformed .HTR request > (CAN-2002-0071) > > Additional detection support will be added in a future update for > BlackICE products. > > Internet Scanner X-Press Update 6.8 includes a check, IisMs02018Patch, > to detect the installation of the patch for the vulnerabilities > described in this advisory. XPU 6.8 is available from the ISS Download > Center at: http://www.iss.net/download. For questions about downloading > and installing this XPU, email [EMAIL PROTECTED] > > Detection support for these attacks will be included in future X-Press > Updates for RealSecure Network Sensor and RealSecure Server Sensor. > These XPUs will be available from the ISS Download Center, and this > alert will be updated when these updates become available. > > ______ > > About Internet Security Systems (ISS) > Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a > pioneer and world leader in software and services that protect critical > online resources from an ever-changing spectrum of threats and misuse. > Internet Security Systems is headquartered in Atlanta, GA, with > additional operations throughout the Americas, Asia, Australia, Europe > and the Middle East. > > Copyright (c) 2002 Internet Security Systems, Inc. All rights reserved > worldwide. > > Permission is hereby granted for the electronic redistribution of this > document. It is not to be edited or altered in any way without the > express written consent of the Internet Security Systems X-Force. If you > wish to reprint the whole or any part of this document in any other > medium excluding electronic media, please email [EMAIL PROTECTED] for > permission. > > Disclaimer: The information within this paper may change without notice. > Use of this information constitutes acceptance for use in an AS IS > condition. There are NO warranties, implied or otherwise, with regard to > this information or its use. Any use of this information is at the > user's risk. In no event shall the author/distributor (Internet Security > Systems X-Force) be held liable for any damages whatsoever arising out > of or in connection with the use or spread of this information. > > X-Force PGP Key available on MIT's PGP key server and PGP.com's key > server, > as well as at http://www.iss.net/security_center/sensitive.php > > Please send suggestions, updates, and comments to: X-Force > [EMAIL PROTECTED] of Internet Security Systems, Inc. > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.2 > > iQCVAwUBPLTUcjRfJiV99eG9AQHAXAP/bZAmOetnSGZ2EdIaX8UzWgj6wrdiMAp6 > 6m36F8ABJEXR3K9pRbX7P3qYs8fUkwHQtGi6WXhW4N/5Q7K8XBRqosT6gxa0Uu32 > HeENRPb3oNJoQkZoCqjBiIn09qgMeFF9dMWeowneJu30Cz0+4SWl60dpbU+tPLmd > PAhqVshkH14= > =qtZH > -----END PGP SIGNATURE----- > > --------------------------------------------------------- Archived messages from this list can be found at: http://www.mail-archive.com/tech-cord@aea5.k12.ia.us/ ---------------------------------------------------------