TUCoPS :: Windows Apps :: ciack033.htm

Microsoft "Myriad Escaped Characters" Vulnerability
Microsoft "Myriad Escaped Characters" Vulnerability Privacy and Legal Notice

CIAC INFORMATION BULLETIN

K-033: Microsoft "Myriad Escaped Characters" Vulnerability

April 13, 2000 18:00 GMT
PROBLEM:       A vulnerability has been identified in Microsoft Internet
               Information Server (IIS), versions 4 & 5. Malicious users could
               embed a large number of escaped character sequences within a
               URL causing a denial of service attack.
PLATFORM:      Any Microsoft Internet Information Server system.
DAMAGE:        A Internet Information Server reading the malformed URL will
               suffer a denial of service attack. Attempting to interpret the
               URL increases the CPU load on a server. The increase in CPU
               load lasts only until the URL is processed by the CPU. A string
               of malformed URL's could make a system unusable for other
               processes, causing a denial of service for users. This
               vulnerability does not have the capability of deleting/adding
               files to the server or to crash the server.
SOLUTION:      Install the patch as provided by Microsoft.

VULNERABILITY The risk is medium. No system compromise is provided by this ASSESSMENT: vulnerability, but the ability to perform a denial of service attack does exist.
[ Start Microsoft Advisory ] Microsoft Security Bulletin (MS00-023) - -------------------------------------- Patch Available for "Myriad Escaped Characters" Vulnerability Originally Posted: April 12, 2000 Summary ======= Microsoft has released a patch that eliminates a security vulnerability in Microsoft(r) Internet Information Server. The vulnerability could allow a malicious user to slow a web server's response or prevent it from providing service altogether for a period of time. Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-023.asp Issue ===== Special characters can be embedded in URLs by use of so-called escaped character sequences. By providing a specially-malformed URL with an extremely large number of escaped characters, a malicious user could arbitrarily increase the work factor associated with parsing the escaped characters, thereby consuming much or all of the CPU availability on the server and preventing useful work from being done. The vulnerability does not provide any capability to cause the server to fail, or to add, change or delete data on it. The slowdown would only last until the URL had been processed, at which point service would return to normal. Affected Software Versions ========================== - Microsoft Internet Information Server 4.0 - Microsoft Internet Information Server 5.0 Patch Availability ================== - Internet Information Server 4.0 http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20292 - Internet Information Server 5.0 http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20286 Note: Additional security patches are available at the Microsoft Download Center More Information ================ Please see the following references for more information related to this issue. - Frequently Asked Questions: Microsoft Security Bulletin MS00-023, http://www.microsoft.com/technet/security/bulletin/fq00-023.asp - Microsoft Knowledge Base article Q254142 discusses this issue and will be available soon. - Microsoft TechNet Security web site, http://www.microsoft.com/technet/security/default.asp Obtaining Support on this Issue =============================== This is a fully supported patch. Information on contacting Microsoft Technical Support is available at http://support.microsoft.com/support/contact/default.asp. Acknowledgments =============== Microsoft thanks Vanja Hrustic of the Relay Group for reporting the "Myriad Escaped Character" vulnerability to us and working with us to protect customers. Revisions ========= - April 12, 2000: Bulletin Created. - ------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. Last updated April 12, 2000 (c) 2000 Microsoft Corporation. All rights reserved. Terms of use. [ End Microsoft Advisory ]

CIAC wishes to acknowledge the contributions of Microsoft Corp. for the information contained in this bulletin.

CIAC services are available to DOE, DOE Contractors, and the NIH. CIAC can be contacted at:
    Voice:          +1 925-422-8193 (7 x 24)
    FAX:            +1 925-423-8002
    STU-III:        +1 925-423-2604
    E-mail:          ciac@llnl.gov
    World Wide Web:  http://www.ciac.org/
                     http://ciac.llnl.gov
                     (same machine -- either one will work)
    Anonymous FTP:   ftp.ciac.org
                     ciac.llnl.gov
                     (same machine -- either one will work)

This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes.
UCRL-MI-119788
[Privacy and Legal Notice]

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH