CRIME Multiple Remote Vulnerabilities in Microsoft's Internet Informa tion Services (IIS

From: George Heuston (GeorgeH@private)
Date: Thu Apr 11 2002 - 16:12:52 PDT

  • Next message: Andy Schroder: "CRIME"

    National Infrastructure Protection Center
    "Multiple Remote Vulnerabilities in Microsoft's Internet Information 
    Services (IIS) "
    Advisory 02-002
    11 April 2002
    
    
    The NIPC is issuing this advisory to highlight the significance of the 
    above vulnerability addressed in Microsoft Security Bulletin MS02-018 
    dated 10 April 2002, which can be found here:
    
    http://www.microsoft.com/technet/security/bulletin/MS02-018.asp
    
    Microsoft published this Security Bulletin that includes multiple buffer 
    overflow conditions, which could allow an attacker remote access to the 
    server with various privilege levels, depending on the version of IIS. 
    Multiple denial of service conditions can make the server unusable until 
    the server is restarted.  Three cross-site scripting vulnerabilities can 
    allow malicious codes to be run on unsuspected "clients" of the server.
    
    While there have been no reported victims, the NIPC is issuing this 
    advisory to emphasize the significance of these vulnerabilities and to 
    make system administrators aware that attackers could exploit these 
    vulnerabilities to gain remote access.  This could provide the attacker 
    with the ability to take any action desired, such as installing 
    malicious code, running programs, reconfiguring, adding, changing, or 
    deleting files.  Based on the nature of the potential harm (remote 
    system account compromise) and the NIPC's assessment that there is a 
    strong likelihood that this vulnerability may be exploited against the 
    large number of Windows servers running IIS, the NIPC considers this to 
    be a high level threat and is issuing this advisory in advance of any 
    reported victims.  The NIPC re-enforces Microsoft's recommendation that 
    all IIS server system administrators consider applying the patches.
    
    Recommendation:
    
    The Microsoft bulletin describing this vulnerability and the patches to 
    fix the problems may be found here:
    
    http://www.microsoft.com/technet/security/bulletin/MS02-018.asp
    
    Microsoft strongly recommends that all IIS server administrators 
    mitigate this vulnerability immediately by applying the patches.
    
    Background:
    
    As reported by Microsoft, these vulnerabilities affect all installations 
    of IIS, versions 4.0, 5.0 and 5.1 running on Microsoft Windows NT 4.0, 
    Windows 2000, or Windows XP (Windows web server IIS software.)  Having 
    this service installed on a Windows machine does not make it vulnerable 
    to these exploits, the machine has to actually have the IIS software 
    running to be affected.
    
    The NIPC considers this to be a significant threat due to the magnitude 
    and type of potential victim systems, coupled with the potential for 
    remote compromise and the level of compromise.
    
    Recipients of this advisory are encouraged to report computer crime to 
    federal, state, or local law enforcement and to other appropriate 
    authorities.  Incidents may be reported online at 
    http://www.nipc.gov/incident/cirr.htm.  The NIPC Watch and Warning Unit 
    can be reached at (202) 323-3204/3205/3206 or nipc.watch@private
    



    This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:40:14 PDT