The service is ON by default and can result in a total compromise of the server. Patch is available - fix it now or you WILL get burned.
The exploit is already in the wild.
Thoughts, anyone?
A THREAT TO UNITED STATES NATIONAL SECURITY DURING WARTIME
Are there any jokers left who actually recommend IIS to their CIOS???? Please let me know so I can short the stock.
From: Windows NTBugtraq Mailing List On Behalf Of Russ Sent: Monday, March 17, 2003 13:20 To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM Subject: Alert: Microsoft Security Bulletin - MS03-007 http://www.microsoft.com/technet/security/bulletin/MS03-007.asp Unchecked buffer in Windows component could cause web server compromise (815021) Originally posted: March 17, 2003 Summary Who should read this bulletin: Systems administrators running Microsoft ® Windows ® 2000 Impact of vulnerability: Run code of attacker's choice Maximum Severity Rating: Critical Recommendation: Systems administrators should apply the patch immediately Affected Software: - Microsoft Windows 2000 Technical description: Microsoft Windows 2000 supports the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol. WebDAV, defined in RFC 2518, is a set of extensions to the Hyper Text Transfer Protocol (HTTP) that provide a standard for editing and file management between computers on the Internet. A security vulnerability is present in a Windows component used by WebDAV, and results because the component contains an unchecked buffer. An attacker could exploit the vulnerability by sending a specially formed HTTP request to a machine running Internet Information Server (IIS). The request could cause the server to fail or to execute code of the attacker's choice. The code would run in the security context of the IIS service (which, by default, runs in the LocalSystem context). Although Microsoft has supplied a patch for this vulnerability and recommends customers install the patch immediately, additional tools and preventive measures have been provided that customers can use to block the exploitation of this vulnerability while they are assessing the impact and compatibility of the patch. These temporary workarounds and tools are discussed in the "Workarounds" section in the FAQ below. Mitigating factors: - URLScan, which is a part of the IIS Lockdown Tool will block this attack in its default configurations - The vulnerability can only be exploited remotely if an attacker can establish a web session with an affected server Vulnerability identifier: CAN-2003-0109
Are you sure IIS is enabled by default on W2K? I may be wrong, but I'm pretty sure it isn't. Normally one would enable IIS by going into Add/Remove Programs, Add/Remove Windows Components, and then selecting IIS.