Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: IIS :: ciacl132.txt

CIAC L-132 Microsoft Cumulative Patch for.IIS




. Department of Energy
                     Computer Incident Advisory Center
                           ___  __ __    _     ___
                          /       |     /_\   /
                          \___  __|__  /   \  \___
             __________________________________________________________

                             INFORMATION BULLETIN

                       Microsoft Cumulative Patch for IIS

August 16, 2001 21:00 GMT                                         Number L-132
______________________________________________________________________________
PROBLEM:       Microsoft has released a cumulative patch to fix five 
               vulnerabilities resulting in either denial of service or 
               elevation of privileges. This patch includes the functionality  
               of all security patches to date for IIS 5.0, and for IIS 4.0 
               since Windows NT(r) 4.0 service Pack 5. 
PLATFORM:      IIS 4.0 and 5.0 
DAMAGE:        Unpatched systems are vulnerable to denial of service attacks 
               or the possibility of privileges being elevated. 
SOLUTION:      Before applying the patch, system administrators should check 
               the caveats discussed in this advisory. 
______________________________________________________________________________
VULNERABILITY  The risk is MEDIUM. This patch also eliminates the side effect 
ASSESSMENT:    of the previous IIS cumulative patch by restoring proper  
               functioning of UPN-style logons via FTP and W3SVC. 
______________________________________________________________________________

[******  Start Microsoft Security Bulletin MS01-044  ******]


-----------------------------------------------------------------------
Title:      15 August 2001 Cumulative Patch for IIS
Date:       15 August 2001
Software:   IIS 4.0 and 5.0
Impact:     Five vulnerabilities resulting in either denial of
            service or privilege elevation
Bulletin:   MS01-044


Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-044.asp.
-----------------------------------------------------------------------


Issue:
======
This patch is a cumulative patch that includes the functionality of
all security patches released to date for IIS 5.0, and all patches
released for IIS 4.0 since Windows NT(r) 4.0 Service Pack 5. A
complete listing of the patches superseded by this patch is provided
below, in the section titled "Additional information about this
patch". Before applying the patch, system administrators should take
note of the caveats discussed in the same section.


In addition to including all previously released security patches,
this patch also includes fixes for five newly discovered security
vulnerabilities affecting IIS 4.0 and 5.0:
 - A denial of service vulnerability that could enable an attacker
   to cause the IIS 4.0 service to fail, if URL redirection has
   been enabled. The "Code Red" worm generates traffic that can in
   some cases exploit this vulnerability, with the result that an
   IIS 4.0 machine that wasn't susceptible to infection via the
   worm could nevertheless have its service disrupted by the worm.
 - A denial of service vulnerability that could enable an attacker
   to temporarily disrupt service on an IIS 5.0 web server. WebDAV
   doesn't correctly handle particular type of very long, invalid
   request. Such a request would cause the IIS 5.0 service to fail;
   by default, it would automatically restart.
 - A denial of service vulnerability involving the way IIS 5.0
   interprets content containing a particular type of invalid MIME
   header. If an attacker placed content containing such a defect
   onto a server and then requested it, the IIS 5.0 service would
   be unable to serve any content until a spurious entry was removed
   from the File Type table for the site.
 - A buffer overrun vulnerability involving the code that performs
   server-side include (SSI) directives. An attacker who had the
   ability to place content onto a server could include a malformed
   SSI directive that, when the content was processed, would result
   in code of the attacker's choice running in Local System context.
 - A privilege elevation vulnerability that results because of a flaw
   in a table that IIS 5.0 consults when determining whether a
   process should in-process or out-of-process. IIS 5.0 contains a 
   table that lists the system files that should always run in-process. 
   However, the list provides the files using relative as well as 
   Absolute addressing, with the result that any file whose name matched 
   that of a file on the list would run in-process.


In addition, this patch eliminates a side effect of the previous IIS
cumulative patch (discussed in the Caveats section of Microsoft
Security Bulletin MS01-026) by restoring proper functioning of
UPN-style logons via FTP and W3SVC.


Mitigating Factors:
====================
URL Redirection denial of service:
 - This vulnerability only affects IIS 4.0. IIS 5.0 is not
   affected.
 - The vulnerability only occurs if URL redirection is enabled.
 - The vulnerability does not provide any capability to compromise
   data on the server or gain administrative control over it.


WebDAV request denial of service:
 - The vulnerability only affects IIS 5.0. IIS 4.0 is not affected.
 - The effect of an attack via this vulnerability would be temporary.
   The server would automatically resume normal service as soon as
   the malformed requests stopped arriving.
 - The vulnerability does not provide an attacker with any capability
   to carry out WebDAV requests.
 - The vulnerability does not provide any capability to compromise
   data on the server or gain administrative control over it.


MIME header denial of service:
 - The vulnerability only affects IIS 5.0. IIS 4.0 is not affected.
 - In order to exploit this vulnerability, the attacker would need
   to have the ability to install content on the server. However,
   by default, unprivileged users do not have this capability, and
   best practices strongly recommend against granting it to untrusted
   users.


SSI privilege elevation vulnerability:
 - In order to exploit this vulnerability, the attacker would need
   to have the ability to install content on the server. However,
   by default, unprivileged users do not have this capability, and
   best practices strongly recommend against granting it to untrusted
   users.


System file listing privilege elevation vulnerability:
 - The vulnerability only affects IIS 5.0. IIS 4.0 is not affected.
 - In order to exploit this vulnerability, the attacker would need
   to have the ability to install content on the server. However,
   by default, unprivileged users do not have this capability, and
   best practices strongly recommend against granting it to untrusted
   users.


Patch Availability:
===================
 - A patch is available to fix these vulnerabilities. Please read the
   Security Bulletin
   http://www.microsoft.com/technet/security/bulletin/ms01-044.asp
   for information on obtaining this patch.


Acknowledgment:
===============
 - John Waters of Deloitte and Touche for reporting the MIME type
   denial of service vulnerability.
 - The NSFocus Security Team (http://www.nsfocus.com) for reporting
   the SSI privilege elevation vulnerability.
 - Oded Horovitz of Entercept(tm) Security Technologies
  (http://www.entercept.com) for reporting the system file listing
   privilege elevation vulnerability.


----------------------------------------------------------------------


THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.



[******  End Microsoft Security Bulletin MS01-044  ******]

______________________________________________________________________________

CIAC wishes to acknowledge the contributions of Microsoft for the 
information contained in this bulletin.
______________________________________________________________________________


CIAC, the Computer Incident Advisory Center, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.

CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
    Voice:    +1 925-422-8193 (7x24)
    FAX:      +1 925-423-8002
    STU-III:  +1 925-423-2604
    E-mail:   ciac@ciac.org

Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.

   World Wide Web:      http://www.ciac.org/
   Anonymous FTP:       ftp.ciac.org

PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins.  If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained via WWW at http://www.first.org/.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.

LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)

L-122: FreeBSD tcpdump Remote Buffer OVerflow Vulnerability
L-123: AIX libi18n Library Vulnerability
L-124: Remote Buffer Overflow in telnetd
L-125: SGI netprint Dynamic Shared Objects (DSO) Exploit
L-126: Microsoft Remote Procedure Call (RPC) Server Vulnerability
L-127: Sun BIND Vulnerabilities
L-128: MIT Kerberos 5 telnetd Buffer Overflows
L-129: Sun in.ftpd Filename Expansion Vulnerability
L-130: Multiple DoS Vulnerabilities in Cisco Broadband Operating Sy
L-131: IBM AIX telnetd Buffer Overflow






TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH