Original release date: May 02, 2001<BR> Last revised: --<BR> Source: CERT/CC<BR> <P>A complete revision history is at the end of this file. <A NAME="affected"> <H3>Systems Affected</H3> <ul> <li>Systems running Microsoft Windows 2000 with IIS 5.0 enabled</li> </ul> <A NAME="overview"> <H2>Overview</H2> <P> A vulnerability exists in Microsoft IIS 5.0 running on Windows 2000 that allows a remote intruder to run arbitrary code on the victim machine, allowing them to gain complete administrative control of the machine. <P> A proof-of-concept exploit is publicly available for this vulnerability, which increases the urgency that system administrators apply the patch. </P> <P> <A NAME="description"> <H2>I. Description</H2> Windows 2000 includes support for the Internet Printing Protocol (IPP) via an ISAPI extension. According to Microsoft, this extension is installed by default on all Windows 2000 systems, but it is only accesible through IIS 5.0. The IPP extension contains a buffer overflow that could be used by an attacker to execute arbitrary code in the Local System security context, essentially giving the attacker compete control of the system. This vulnerability was discovered by eEye Digital Security. <P> Microsoft has issued the following bulletin regarding this vulnerability: <DL><DD> <A HREF="http://www.microsoft.com/technet/security/bulletin/MS01-023.asp">http://www.microsoft.com/technet/security/bulletin/MS01-023.asp</A> </DL> <P>This vulnerability has been assigned the identifier CAN-2001-0241 by the Common Vulnerabilities and Exposures (CVE) group: <dl> <dd><A HREF="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0241">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0241</a> </dd> </dl> </P> <A NAME="impact"> <H2>II. Impact</H2> <P> Anyone who can reach a vulnerable web server can execute arbitrary code in the Local System security context, resulting in the intruder gaining complete control of the system. Note that this may be significantly more serious than a simple "web defacement." <P> </P> <A NAME="solution"> <H2>III. Solution</H2> <H4>Apply a patch from your vendor</H4> <P>A patch is available from Microsoft at<BR> <DL><DD> <A HREF="http://www.microsoft.com/Downloads/Release.asp?ReleaseID=29321">http://www.microsoft.com/Downloads/Release.asp?ReleaseID=29321</A> </DL> <p>Additional advice on securing IIS web servers is available from <dl><dd> <A HREF="http://www.microsoft.com/technet/security/iis5chk.asp">http://www.microsoft.com/technet/security/iis5chk.asp</a> <A HREF="http://www.microsoft.com/technet/security/tools.asp">http://www.microsoft.com/technet/security/tools.asp</a> </dl> <A NAME="vendors"> <H2>Appendix A. Vendor Information</H2> <A name="microsoft"> <H3>Microsoft Corporation</H3> <P> The following documents regarding this vulnerability are available from Microsoft:<BR> <DL><DD> <A HREF="http://www.microsoft.com/technet/security/bulletin/MS01-023.asp">http://www.microsoft.com/technet/security/bulletin/MS01-023.asp</A> </DL> </P> <H2>References</H2> <ol> <A NAME=ref1></a> <li><i>VU#516648: Microsoft Windows 2000/Internet Information Server (IIS) 5.0 Internet Printing Protocol (IPP) ISAPI contains buffer overflow,</i> CERT/CC, 05/02/2001, <a href="http://www.kb.cert.org/vuls/id/516648">http://www.kb.cert.org/vuls/id/516648</a></li> </ol> <A HREF="mailto:cert@cert.org?subject=CA-2001-09%20Feedback%20VU%25498440">Authors</A>: Chad Dougherty, Shawn Hernan. <P> <!--#include virtual="/include/footer_nocopyright.html" --> <P>Copyright 2001 Carnegie Mellon University.</P> <P>Revision History <PRE> May 02, 2001: Initial Release </PRE> |