[Full-Disclosure] Microsoft Biztalk Server ISAPI HTTP Receive function buffer overflow

From: Cesar (cesarc56at_private)
Date: Mon May 05 2003 - 13:40:12 PDT

  • Next message: L. Walker: "Re: NetBIOS could be used as network flood amplier"

    Security Advisory
    
    Name:  Microsoft Biztalk Server ISAPI HTTP Receive
    function buffer overflow
    System Affected :  Microsoft BizTalk Server 2002
    Severity :  High 
    Remote exploitable : Yes
    Author:    Cesar Cerrudo.
    Date:    05/05/03
    Advisory Number:    CC040301
    
    
    Legal Notice:
    
    This Advisory is Copyright (c) 2003 Cesar Cerrudo.
    You may distribute it unmodified and for free. You may
    NOT modify it and distribute it or distribute parts of
    it without the author's written permission. You may
    NOT use it for commercial intentions (this means
    include it in vulnerabilities databases,
    vulnerabilities scanners, any paid service, etc.)
    without the author's written permission. You are free
    to use Microsoft bulletin's details for commercial
    intentions.
    
    
    Disclaimer:
    
    The information in this advisory is believed to be
    true though it may be false.
    The opinions expressed in this advisory are my own and
    not of any company. The usual standard disclaimer
    applies, especially the fact that Cesar Cerrudo is not
    liable for any damages caused by direct or indirect
    use of the information or functionality provided by
    this advisory. Cesar Cerrudo bears no responsibility
    for content or misuse of this advisory or any
    derivatives thereof.
    
    
    Overview:
    
    Microsoft Biztalk Server is a Microsoft product for
    business-process automation 
    and application-integration both within and between
    businesses. BizTalk Server  
    provides a powerful Web-based development and
    execution environment that integrates 
    loosely coupled, long-running business processes, both
    within and between companies. 
    BizTalk Server features include integration among
    existing applications; the definition
    of document specifications and specification
    transformations; and the monitoring and 
    logging of run-time activity. The server provides a
    standard gateway for sending and 
    receiving documents across the Internet, as well as
    providing a range of services that 
    ensure data integrity, delivery, security, and support
    for the BizTalk Framework and 
    other key document formats.
    BizTalk Server 2002 provides the ability to exchange
    documents using the HTTP format. 
    A buffer overflow exists in the component used to
    receive HTTP documents - the HTTP 
    receiver - and could result in an attacker being able
    to execute code of their choice 
    on the BizTalk Server.
    
    
    Details:
    
    An HTTP receive function is an Internet Server
    Application Programming Interface 
    (ISAPI) extension that provides an "out-of-the-box"
    utility for immediately receiving 
    documents over Hypertext Transfer Protocol (HTTP). The
    ISAPI is named BizTalkHTTPReceive.dll.
    By submiting a HTTP request with an overly long string
    as query string parameter a 
    buffer overflow ocurrs:
    
    POST /Site/biztalkhttpreceive.dll?XXXX...(more than
    250 chars) HTTP/1.0
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows
    NT 5.0; .NET CLR 1.0.3705)
    Host: servername
    Content-Length: <Data submited length>
    Proxy-Connection: Keep-Alive
    Pragma: no-cache
    
    <...Data submited...>
    
    
    This vulnerability can be directly exploited by an
    attacker if he has enough permissions 
    (this will depends on web server configuration), if
    the attacker hasn't enough permissions 
    he can exploit it through XSS or sending an
    administrator an HTML e-mail, etc. targeting 
    the vulnerable server. 
    Depending on the Windows user account configured to
    run COM+ Applications under for the 
    vulnerable site (the user account configured always
    must have access to BizTalk Messaging 
    Management database and the COM+ packages BizTalk
    Server Interchange Application and BizTalk 
    Server Internal Utility), explotation of this
    vulnerability will allow an attacker to complete 
    compromise OS and/or Biztalk Server files and
    databases.
    
    
    
    Workaround:
    
    Remove BizTalkHTTPReceive.dll ISAPI if you are using
    HTTP receive function and use another 
    receive functions like Message Queuing receive
    function or file receive function.
    
    
    Vendor Status :
    
    Microsoft was contacted on 02/14/03, we work together
    and Microsoft released a fix.
    
    
    Patch Available : 
    
    http://www.microsoft.com/technet/security/bulletin/MS03-016.asp
    
    NEW SECURITY LIST!!!: For people interested in SQL
    Server security, vulnerabilities, SQL injection, etc.,
    I'm starting a new mailing list.
    People subscribed to the list received this advisory
    five days ago!!.
    Join at:
    
    sqlserversecurity-subscribeat_private
    http://groups.yahoo.com/group/sqlserversecurity/
    
    
    
    __________________________________
    Do you Yahoo!?
    The New Yahoo! Search - Faster. Easier. Bingo.
    http://search.yahoo.com
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Mon May 05 2003 - 15:16:32 PDT