Original release date: May 02, 2001<BR>
Last revised: --<BR>
Source: CERT/CC<BR>

<P>A complete revision history is at the end of this file.

<A NAME="affected">
<H3>Systems Affected</H3>
<ul>
<li>Systems running Microsoft Windows 2000 with IIS 5.0 enabled</li>
</ul>

<A NAME="overview">
<H2>Overview</H2>
<P>
A vulnerability exists in Microsoft IIS 5.0 running on Windows 2000
that allows a remote intruder to run arbitrary code on the victim
machine, allowing them to gain complete administrative control of the
machine. 

<P> A proof-of-concept exploit is publicly available for this
vulnerability, which increases the urgency that system administrators
apply the patch.

</P>
 
<P>
<A NAME="description">
<H2>I. Description</H2>

Windows 2000 includes support for the Internet Printing Protocol (IPP)
via an ISAPI extension.  According to Microsoft, this extension is
installed by default on all Windows 2000 systems, but it is only
accesible through IIS 5.0. The IPP extension contains a buffer
overflow that could be used by an attacker to execute arbitrary code
in the Local System security context, essentially giving the attacker
compete control of the system. This vulnerability was discovered by
eEye Digital Security.
<P>
Microsoft has issued the following bulletin regarding this
vulnerability:

<DL><DD>
<A HREF="http://www.microsoft.com/technet/security/bulletin/MS01-023.asp">http://www.microsoft.com/technet/security/bulletin/MS01-023.asp</A>
</DL>

<P>This vulnerability has been assigned the identifier CAN-2001-0241 by
the Common Vulnerabilities and Exposures (CVE) group:

<dl>
<dd><A
HREF="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0241">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0241</a>
</dd>
</dl>
</P>


<A NAME="impact">
<H2>II. Impact</H2>

<P>
Anyone who can reach a vulnerable web server can execute arbitrary
code in the Local System security context, resulting in the intruder
gaining complete control of the system. Note that this may be
significantly more serious than a simple "web defacement."
<P>

</P>

<A NAME="solution">
<H2>III. Solution</H2>

<H4>Apply a patch from your vendor</H4>

<P>A patch is available from Microsoft at<BR>
<DL><DD>
<A HREF="http://www.microsoft.com/Downloads/Release.asp?ReleaseID=29321">http://www.microsoft.com/Downloads/Release.asp?ReleaseID=29321</A>
</DL>
<p>Additional advice on securing IIS web servers is available from 



<dl><dd>
<A HREF="http://www.microsoft.com/technet/security/iis5chk.asp">http://www.microsoft.com/technet/security/iis5chk.asp</a>

<A HREF="http://www.microsoft.com/technet/security/tools.asp">http://www.microsoft.com/technet/security/tools.asp</a>
</dl>

<A NAME="vendors">
<H2>Appendix A. Vendor Information</H2>

<A name="microsoft">
<H3>Microsoft Corporation</H3>
<P>
The following documents regarding this vulnerability are available
from Microsoft:<BR>

<DL><DD>
<A HREF="http://www.microsoft.com/technet/security/bulletin/MS01-023.asp">http://www.microsoft.com/technet/security/bulletin/MS01-023.asp</A>
</DL>

</P>

<H2>References</H2>
<ol>
<A NAME=ref1></a>
<li><i>VU#516648: Microsoft Windows 2000/Internet Information Server (IIS) 5.0 Internet Printing Protocol (IPP) ISAPI contains buffer overflow,</i> CERT/CC, 05/02/2001, <a href="http://www.kb.cert.org/vuls/id/516648">http://www.kb.cert.org/vuls/id/516648</a></li> 
</ol>



<A HREF="mailto:cert@cert.org?subject=CA-2001-09%20Feedback%20VU%25498440">Authors</A>:&nbsp;
Chad Dougherty, Shawn Hernan.

<P>

<!--#include virtual="/include/footer_nocopyright.html" -->

<P>Copyright 2001 Carnegie Mellon University.</P>

<P>Revision History
<PRE>
May 02, 2001: Initial Release
</PRE>