• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Microsoft IIS WebDAV Buffer Overflow Vulnerability

guyver01

Lifer
Microsoft Corp. announced on Monday that it had uncovered a critical security vulnerability in a component of Windows 2000 operating system, which could enable a remote attacker to gain control of a system running Windows 2000 and Internet Information Server (IIS) Web server. Microsoft has also reported receiving isolated reports of attacks that exploited this vulnerability.

Vulnerability Description:
An unchecked buffer in the Windows 2000 component used to handle the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol could allow an attacker to cause a buffer overflow on a machine running IIS 5.0. (WebDAV is a set of extensions to HTTP that allows users to edit and manage files on remote Web servers. The protocol is designed to create collaborative applications that facilitate geographically distant software development teams.)

Vulnerability Exploitation:
Attackers could mount a denial-of-service attack against vulnerable machines or execute their own code in the security context of the IIS service, possibly gaining control of vulnerable systems. Attacks could come in the form of malformed WebDAV requests to a system running IIS Version 5.0. WebDAV requests typically use the same port as other Web traffic (Port 80) - attackers would only need to be able to establish a connection with the Web server to exploit the vulnerability.

Vulnerable Systems:
Windows 2000 systems running IIS Version 5.0 are vulnerable:
- IIS 5.0 is installed by default on all server versions of Windows 2000. (It is NOT installed on Windows 2000 Professional by default.)
- Windows NT and XP systems are not vulnerable.

Remedial Actions:
Microsoft has provided a patch for the WebDAV vulnerability and recommends that customers using IIS Version 5.0 on Windows 2000 apply that patch at the earliest possible opportunity. An updated version of Microsoft's IIS Lockdown Tool was also released for organizations that are unable to immediately install the patch or that do not need to run IIS. The Lockdown Tool disables unnecessary features of IIS, reducing the vulnerability to attacker. Other utilities were provided for organizations that require the use of IIS but can't apply the patch or deploy the Lockdown Tool.


Recommendations:
- If IIS is not required, administrators are advised to remove or disable it at the earliest opportunity.
- If IIS is required, immediate application of the recommended security patch is advised. If this is not possible, system administrators are advised to run the Lockdown tool to secure IIS.

IIS LockDown Tool/URLScan

U.S. military computer attacked by this Previously undiscovered flaw

Microsoft Security Bulletin MS03-007
 
People, this is an important one..

Patch your servers now, a worm exploiting this can be expected soon.


Every IIS Version 5.0 is vulernable, until patched.

Security Focus Workaround::
Workaround:
To disable WebDAV on IIS 5.0, see the article "How to Disable WebDAV for IIS 5.0" in the References section.

The following prevention steps were provided by Mark Burnett <mb@xato.net>:

1. Completely disable WebDAV by setting the value of the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\DisableWebDAV
registry key to 1.

2. Limit the length of requests (the url and any headers) by setting
the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\w3svc\parameters
MaxClientRequestBuffer to something like 16k.

3. Block the following WebDAV HTTP verbs using URLScan (either by specifically blocking them or by not listing them as allowed): OPTIONS, PROPFIND, PROPPATCH, MKCOL, DELETE, PUT, COPY, MOVE, LOCK, UNLOCK, OPTIONS, and SEARCH. Note that FrontPage does require the OPTIONS method to work properly.

4. Block the following WebDAV-related headers using the [DenyHeaders] section of URLScan.ini:
[DenyHeaders]
DAV:
Depth:
Destination:
If:
Label:
Lock-Token:
Overwrite:
TimeOut:
TimeType:
DAVTimeOutVal:
Other:
Translate:

5. If you require WebDAV, you can limit the length of each individual header with these entries in the [RequestLimits] section (The exact values are obviously pretty generic and may need to be increased or decreased based on your
particular configuration):
[RequestLimits]
Max-DAV=250
Max-Depth=250
Max-Destination=250
Max-If=250
Max-Label=250
Max-Lock-Token=250
Max-Overwrite=250
Max-TimeOut=250
Max-TimeType=250
Max-DAVTimeOutVal=250
Max-Other=250
Max-Translate=250

Solution:

Some reports indicate that the Microsoft patches for this issue may cause problems. It is not known if this is the result of the patches conflicting with certain configurations. Administrators are advised to apply workaround procedures until a revised Microsoft patch is released.

Microsoft has released fixes:




Microsoft Windows 2000 Professional SP3:

Microsoft Patch Q815021
http://microsoft.com/downloads/deta...45-5145-4844-B62E-C69D32AC929B&displaylang=en
All versions of Windows 2000 except Japanese NEC.

 
once again microsoft proves that they closed source software is much less secure than open source software.
 
Originally posted by: amdmang
once again microsoft proves that they closed source software is much less secure than open source software.

Get a clue moron. Vulnerabilities are exposed *by the dozens* every single day.
 
Originally posted by: Descartes
Originally posted by: amdmang
once again microsoft proves that they closed source software is much less secure than open source software.

Get a clue moron. Vulnerabilities are exposed *by the dozens* every single day.

Exactly.
 
Back
Top