News

Microsoft Issues Another Cumulative IIS Patch

Microsoft bundled five newly discovered IIS vulnerabilities into a cumulative patch, posted Wednesday, that rolls together all the fixes for the Web server. Microsoft Corp. bundled five newly discovered IIS vulnerabilities into a cumulative patch, posted Wednesday night, that rolls together all the fixes for the Web server.

The beleaguered Internet Information Server/Services software has been the source of negative publicity for Microsoft lately due to its role as the vector for the Code Red worm. The new security rollup includes the fixes for Code Red, but was created primarily to address other vulnerabilities.

It is also the second time this year that Microsoft has rolled security fixes together for IIS. Redmond issued a similar security roundup (MS01-26) in May. A security rollup was also released for Windows NT 4.0 a few weeks ago in lieu of the cancelled Service Pack 7.

In its bulletin announcing the new IIS security patch, Microsoft confirmed the existence of five IIS vulnerabilities which can be exploited by means of denial-of-service (DoS), buffer overrun or privilege-elevation attacks.

A message from Russ Cooper, moderator of the NTBugTraq Mailing List, reflected a "here we go again" attitude about the state of IIS security.

"I understand that you've probably just finished ensuring that all of your IIS servers have had MS01-033 [the Code Red patch] applied. Maybe you even went so far as to apply MS01-026 (the last IIS cumulative patch)," Cooper wrote.

"I'm loath to ask you to now go back to all of these machines and apply yet another patch, however...there are several circumstances that may apply to your systems that might make it necessary for you to get this new Security Bulletin patch applied quickly," Cooper wrote. Users should consider the patch immediately if they run Web hosting environments, allow IIS authoring or do URL redirects from an IIS 4.0 box, according to Cooper.

Possible attack scenarios include:

A DoS attack that exploits a flaw in IIS 4.0's Web site redirection capabilities and which can cause an IIS server to stop responding to HTTP requests. According to Microsoft, the notorious Code Red worm generates traffic that in some cases is capable of exploiting this vulnerability.

In the aftermath of the Code Red worm, a number of administrators posted messages to Microsoft's IIS newsgroup (microsoft.public.inetserver.iis ) in which they complained that even though their IIS 4.0 servers weren't supposed to be susceptible to Code Red, they were nonetheless crashing as a result of the extremely high network traffic generated by other infected IIS 5.0 servers.

A DoS attack that exploits a flaw in Microsoft's implementation of Web Distributed Authoring and Versioning (WebDAV), a set of enhancements to HTTP that facilitates Web-based document management capabilities.

According to Microsoft, its WebDAV implementation doesn't correctly process a particular type of malformed request. If an attacker submits a malformed request of this kind to an IIS 5.0 Web server, she could cause IIS 5.0 services to crash. Microsoft says that a DoS interruption would only be temporary, however, because IIS 5.0 services automatically restart in the event of a failure.

A DoS attack that exploits a vulnerability associated with the way in which IIS 5.0 interprets Multipurpose Internet Mail Extensions (MIME) content.

Microsoft says that when an attacker places content containing a (particular kind of an) invalid MIME header onto a server and subsequently requests it, a spurious entry is created in the Web site's File Type table. DoS occurs because IIS 5.0 is unable to serve any additional content until the spurious File Type table entry is removed.

A buffer overrun attack that exploits a vulnerability associated with the code that IIS uses to process server-side include (SSI) directives.

According to Microsoft, if an attacker can place a file directly onto a server, she can also include a malformed SSI directive that - once it's processed - will enable her to execute code of her choice on a compromised Windows NT 4.0 or Windows 2000 server in Local System context. Microsoft says that an attacker doesn't actually have to request a file which contains a malformed SSI directive to perpetrate an exploit of this type: Any request for such a file, initiated by an attacker or by an unsuspecting user, could trigger the exploit.

Local system context is the highest security context on a Windows NT or Windows 2000 system. An attacker who successfully exploited a vulnerability of this type would have complete control over a compromised system.

A privilege elevation vulnerability that results because of a flaw in the way that IIS determines whether a process should in-process or out-of-process. Microsoft says that IIS 5.0 uses a table which lists the system files that should always run in-process. Because this table supports both absolute addressing (in which a specific path to an executable is specified) as well as relative addressing (in which only the name of an executable is specified), however, it's possible for an attacker to upload a malicious program, rename it after the fashion of an in-process executable, and execute it with System Level privileges on a server.

An attacker who perpetrates an exploit of this type could take complete control of a compromised system.

The software giant says that by default, unprivileged users don't have the ability to install or upload content to a server, so only privileged users are capable of successfully exploiting the last three vulnerabilities.

Although the latest batch of IIS patches is cumulative, at least four IIS 4.0 vulnerabilities that require administrative action rather than software patching aren't included in the latest hotfix roll-up. Microsoft also says that fixes for non-IIS-related vulnerabilities - including those associated with Front Page Server Extensions and the Index Server/Indexing Service - aren't integrated into the latest hotfix roll-up, either.

But the software giant confirms that the new hotfix roll-ups incorporate support for the Indexing Service/Index Server vulnerability that served as the basis for the recent spate of Code Red attacks.

There are two versions of the new patch. A version for Internet Information Services 5.0 includes all security patches issued so far for IIS 5.0, which is part of Windows 2000. Another version for Internet Information Server 4.0 rolls together all the security fixes for IIS 4.0 since Windows NT 4.0 Service Pack 5.

About the Author

Stephen Swoyer is a Nashville, TN-based freelance journalist who writes about technology.

comments powered by Disqus
Most   Popular