Posted on 03/17/2003 11:42:53 AM PST by taxcontrol
A buffer overflow vulnerability exists in Microsoft IIS 5.0 running on Microsoft Windows 2000. IIS 5.0 is installed and running by default on Microsoft Windows 2000 systems. This vulnerability may allow a remote attacker to run arbitrary code on the victim machine.
An exploit is publicly available for this vulnerability, which increases the urgency that system administrators apply a patch.
See http://www.cert.org/advisories/CA-2003-09.html for details.
The service is ON by default and can result in a total compromise of the server. Patch is available - fix it now or you WILL get burned.
The exploit is already in the wild.
Thoughts, anyone?
A THREAT TO UNITED STATES NATIONAL SECURITY DURING WARTIME
Are there any jokers left who actually recommend IIS to their CIOS???? Please let me know so I can short the stock.
From: Windows NTBugtraq Mailing List On Behalf Of Russ Sent: Monday, March 17, 2003 13:20 To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM Subject: Alert: Microsoft Security Bulletin - MS03-007 http://www.microsoft.com/technet/security/bulletin/MS03-007.asp Unchecked buffer in Windows component could cause web server compromise (815021) Originally posted: March 17, 2003 Summary Who should read this bulletin: Systems administrators running Microsoft ® Windows ® 2000 Impact of vulnerability: Run code of attacker's choice Maximum Severity Rating: Critical Recommendation: Systems administrators should apply the patch immediately Affected Software: - Microsoft Windows 2000 Technical description: Microsoft Windows 2000 supports the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol. WebDAV, defined in RFC 2518, is a set of extensions to the Hyper Text Transfer Protocol (HTTP) that provide a standard for editing and file management between computers on the Internet. A security vulnerability is present in a Windows component used by WebDAV, and results because the component contains an unchecked buffer. An attacker could exploit the vulnerability by sending a specially formed HTTP request to a machine running Internet Information Server (IIS). The request could cause the server to fail or to execute code of the attacker's choice. The code would run in the security context of the IIS service (which, by default, runs in the LocalSystem context). Although Microsoft has supplied a patch for this vulnerability and recommends customers install the patch immediately, additional tools and preventive measures have been provided that customers can use to block the exploitation of this vulnerability while they are assessing the impact and compatibility of the patch. These temporary workarounds and tools are discussed in the "Workarounds" section in the FAQ below. Mitigating factors: - URLScan, which is a part of the IIS Lockdown Tool will block this attack in its default configurations - The vulnerability can only be exploited remotely if an attacker can establish a web session with an affected server Vulnerability identifier: CAN-2003-0109
You know, of course, such unabashed hatred exposes you for what you really are -- nothing less than... a... a TROLL!</sarcasm>
And before you go off on me about Apache/Linux, etc--yes they do have bugs, as you have to defensively pointed out. This just doesn't seem to be the thread to start a war about it, though.
Do you mean the pattern concerning your obsession of trying to defend all things Microsoft by pointing out other's faults? Your zealotry is quite ridiculous.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.