• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

OT: IIS 5.0 Security Issue Alert

RaySun2Be

Lifer
This may be old news for some of you (and more smug smirks from the *nix folks) but I thought I would spread the word on a new, and serious security hole in IIS 5.0 in Win2K:

*"PATCH NOW," SAYS MICROSOFT
By Shawna McAlearney
Security Wire Digest, VOL. 3, NO. 35, May 3, 2001

Calling it the most serious security flaw it's found to date, Microsoft
Tuesday said that more than a million Web servers running IIS 5.0 are
vulnerable to a buffer overflow exploit that could give an attacker
complete control via the .printer Internet Services Application
Programming Interface (ISAPI) filter extension.

"I need to say right up front, this is a serious vulnerability," says
Scott Culp, a Microsoft Security Response Team program manager.
"Everyone who is using IIS 5.0 needs to apply that patch right
now--today, before they go home--if they haven't done so already. The
proper order is install the patch first, read the bulletin second."


Discovered by eEye Digital Security, the "Unchecked Buffer in ISAPI
Extension Could Enable Compromise of IIS 5.0 Server" vulnerability stems
from a component in Windows 2000 that allows users to print remotely
over the Internet. Unless the Internet printer component is disabled
(it's enabled by default) a single string of carefully crafted text
sent to it can give an attacker full control of a Web server running IIS
5.0. The vulnerability arises when a buffer of approximately 420 bytes
is sent within the HTTP Host: header for a .printer ISAPI request. Web
servers normally stop responding when overflowed; however, Windows
2000 will automatically restart a crashed Web server, making it easier
for remote attackers to execute code. When exploited, there's no IIS
log that records the attack.

"Any Windows 2000 server running IIS 5.0, from the smallest mom-and-pop
shop all the way up to various Fortune 500 companies, is vulnerable to
complete compromise by an attacker," says Marc Maiffret, eEye's chief
hacking officer.

Security experts say it might be the most serious flaw the company has
announced in years. "It's realistic to say that over the next six to 12
months, any large scale compromises that occur will occur as a result of
this vulnerability," says Russ Cooper, editor of NTBugtraq, a Windows
vulnerability listserv. "I would say 98 percent of IIS 5.0 boxes are
vulnerable."


Cooper compared the flaw to the well-known RDS vulnerability found in
1998. "Three years later, credit card numbers are still being stolen as
a result of RDS," he says. "It's reasonable to suggest we will be
talking about this (vulnerability) for several years to come."

After confirming the severity of the vulnerability, Culp says Microsoft
implemented extraordinary steps to mitigate and correct the problem.
These include contacting each Microsoft client, notifying the IT and
financial services information sharing and analysis centers (ISACs), and
suspending production on service pack 2 so the patch could be included
in the release.

Mitigation includes removing the .printer script mapping, applying the
Microsoft patch, utilizing the Secure Internet Information Services
Checklist or applying the High Security Template. Sysadmins who followed
the Microsoft IIS 5 security checklist or applied the Microsoft High
Security Template are protected from this attack.

Patch:
Patch
Bulletin:
Bulletin
Secure Internet Information Services Checklist:
Secure IIS Checklist
Windows 2000 ISS Security Configuration Tool:
Win2K IIS Security Config Tool
Security Tool:
Security Tool
 
Thanks for the heads up.

/me wonders...........was this what rebooted my server on May1?

dasm hackers 🙁

careful about the smirks.......as *nix becomes more mainstream it will become
a target too. winblows with the X(extra)P(poopy) will see to *nix taking over.
 
Back
Top