Microsoft Peer Web Services vulnerability

From: Colette.Chamberlandat_private
Date: Thu Jun 17 1999 - 11:35:37 PDT

  • Next message: Geoffrey Cleaves: "Bug in MS FTP 4.0"

    ADVISORY
    6/17/1999
    
    This advisory is for those that run "Microsoft Peer Web Services"  in
    addition to the
    advisory for Microsoft's IIS 4. It also limits Web-based administration to
    the loopback address
    (127.0.0.1) by default.  It also has the  ism.dll   in the /scripts/iisadmin
    directory,
     which allows users / attackers to access the ISAPI application used for
    remote
    web-based administration from an non-loopback IP address.
    
    NOTE: An attacker can simply do a search on Alta Vista for  "Microsoft Peer
    Web Services".
    They then get a complete list of  NT Workstations  running this service. All
    they need to do,
    is append the following to the End of the url:
    
     /scripts/iisadmin/ism.dll?http/dir.
    
    The  user will then be prompted for a UserID and password and if successful
    authentication takes place they are given access to sensitive server
    information. It provides an attacker with a means to brute
    force / guess the Administrators password and if successful an enormous
    amount of reconnaissance work can be achieved through the application's use.
    
    
    Colette Chamberland
    http://www.mc2.nu
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:50:02 PDT