|
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== A U S C E R T A L E R T AL-2001.07 -- AUSCERT ALERT Microsoft IIS 5.0 Remote Administrator Compromise Vulnerability 2 May 2001 =========================================================================== PROBLEM: Microsoft has released an advisory on a vulnerability in IIS 5.0. This vulnerability may allow a remote attacker to execute arbitrary commands on the web server. This may lead to an Administrator compromise. PLATFORM: The following platforms running IIS 5.0, with the Internet Printing ASAPI enabled are vulnerable: Windows 2000 Server Windows 2000 Advanced Server Windows 2000 Datacenter Server Microsoft notes that the Internet Printing ASAPI is enabled by default on these platforms. Web servers using IIS 4.0, or that have had the IIS Lockdown Tool applied are not vulnerable. IMPACT: An attacker may gain Administrator control of the system using this vulnerability. Once the attacker has control, their ability to gain control of other machines on that network is dependent on that network's configuration. There is no logging enabled of IIS buffer overflows, so an attack may be performed unnoticed. An exploit for this vulnerability is currently publicly available. SOLUTION: Microsoft has released a patch for this vulnerability, and strongly recommends that it be applied immediately to all vulnerable IIS web servers. Information on obtaining this patch can be found at: http://www.microsoft.com/technet/security/bulletin/ms01-023.asp According to Microsoft, Service Pack 2 for Windows 2000 will contain this patch when it is released. As a workaround, disabling the Internet Printing ASAPI will protect against this form of attack. Information on doing this can be found at: http://www.microsoft.com/technet/security/iis5chk.asp REFERENCES: More information on this vulnerability can be found in: AUSCERT ESB-2001.178 ftp://ftp.auscert.org.au/pub/auscert/ESB/ESB-2001.178 Microsoft TechNet http://www.microsoft.com/technet/security/bulletin/MS01-023.asp eEYE Digital Security http://www.eeye.com/html/Research/Advisories/AD20010501.html - --------------------------------------------------------------------------- For more information contact Microsoft. - --------------------------------------------------------------------------- The AusCERT team has made every effort to ensure that the information contained in this document is accurate at the time of publication. However, the decision to use the information described is the responsibility of each user or organisation. The appropriateness of this document for an organisation or individual system should be considered before application in conjunction with local policies and procedures. AusCERT takes no responsibility for the consequences of applying the contents of this document. If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). AusCERT maintains an anonymous FTP service which is found on: ftp://ftp.auscert.org.au/pub/. This archive contains past SERT and AusCERT Advisories, and other computer security information. AusCERT maintains a World Wide Web service which is found on: http://www.auscert.org.au/. Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. Postal: Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 AUSTRALIA =========================================================================== -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBOvfVHih9+71yA2DNAQGHyQP/T3mtWTjhOjccWvbjMzO2XI/leLwVmpwi gtdgTCPHJ3M2zVejvLe9zHZZuW4aAk+Ey+nJ2XO5MYac6GAJCyW8la+XzmBXAcD1 8Wi2dCcjM/5LxpL983iwUNzMqK1l/YK45otx8+At3Pg+IimjXDNMex/st25rbN1v NO9KJOErBUc= =7Adh -----END PGP SIGNATURE-----