Vanagon EuroVan
Previous messageNext messagePrevious in topicNext in topicPrevious by same authorNext by same authorPrevious page (December 2000, week 2)Back to main VANAGON pageJoin or leave VANAGON (or change settings)ReplyPost a new messageSearchProportional fontNon-proportional font
Date:         Thu, 14 Dec 2000 10:01:31 -0800
Reply-To:     Don Preston <donpre@MICROSOFT.COM>
Sender:       Vanagon Mailing List <vanagon@gerry.vanagon.com>
From:         Don Preston <donpre@MICROSOFT.COM>
Subject:      Re: Vanagon.com is hacked..
Comments: To: David Beierl <dbeierl@attglobal.net>

The following is a Security Bulletin from the Microsoft Product Security Notification Service.

Please do not reply to this message, as it was sent from an unattended mailbox. ********************************

-----BEGIN PGP SIGNED MESSAGE-----

Microsoft Security Bulletin (MS00-078) - --------------------------------------

Patch Available for "Web Server Folder Traversal" Vulnerability

Originally posted: October 17, 2000

Summary ======= Microsoft has released a patch that eliminates a security vulnerability in Microsoft(r) IIS 4.0 and 5.0. The vulnerability could potentially allow a visitor to a web site to take a wide range of destructive actions against it, including running programs on it.

This vulnerability is eliminated by the patch that accompanied Microsoft Security Bulletin MS00-057. Customers who have applied that patch are already protected against the vulnerability and do not need to take additional action. Microsoft strongly urges all customers using IIS 4.0 and 5.0 who have not already done so to apply the patch immediately.

Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-078.asp

Issue ===== Due to a canonicalization error in IIS 4.0 and 5.0, a particular type of malformed URL could be used to access files and folders that lie anywhere on the logical drive that contains the web folders. This would potentially enable a malicious user who visited the web site to gain additional privileges on the machine - specifically, it could be used to gain privileges commensurate with those of a locally logged-on user. Gaining these permissions would enable the malicious user to add, change or delete data, run code already on the server, or upload new code to the server and run it.

The request would be processed under the security context of the IUSR_machinename account, which is the anonymous user account for IIS. Within the web folders, this account has only privileges that are appropriate for untrusted users. However, it is a member of the Everyone and Users groups and, as a result, the ability of the malicious user to access files outside the web folders becomes particularly significant. By default, these groups have execute permissions to most operating system commands, and this would give the malicious user the ability to cause widespread damage. Customers who have proactively removed the Everyone and Users groups from permissions on the server, or who are hosting the web folders on a different drive from the operating system, would be at significantly less risk from the vulnerability.

Microsoft strongly recommends that all customers running IIS 4.0 or 5.0 immediately apply the patch for this vulnerability. This patch was originally released in August 2000 as a fix for a completely different vulnerability (discussed in Microsoft Security Bulletin MS00-057), and customers who have already applied it do not need to take any additional action.

Affected Software Versions ========================== - Microsoft IIS 4.0 - Microsoft IIS 5.0

Patch Availability ================== - Microsoft IIS 4.0: http://www.microsoft.com/ntserver/nts/downloads/critical/q269862 - Microsoft IIS 5.0: http://www.microsoft.com/windows2000/downloads/critical/q269862

Note: The IIS 4.0 patch can be installed on systems running Windows NT(r) 4.0 Service Packs 5 and 6a. It will be included in Windows NT 4.0 Service Pack 7. The IIS 5.0 patch can be installed on systems running either Windows(r) 2000 Gold or Service Pack 1. It will be included in Windows 2000 Service Pack 2.

Note: The Download Center pages discussed above may, for the next several days, only reference the "File Permissions Canonicalization" vulnerability. However, we are updating the pages to state that it applies to both that vulnerability and this one.

Note: Additional security patches are available at the Microsoft Download Center

More Information ================ Please see the following references for more information related to this issue. - Frequently Asked Questions: Microsoft Security Bulletin MS00-078, http://www.microsoft.com/technet/security/bulletin/fq00-078.asp - Microsoft Security Bulletin MS00-057, Microsoft Security Bulletin http://www.microsoft.com/technet/security/bulletin/ms00-057.asp - Microsoft Knowledge Base article Q276489 discusses this issue and will be available soon. - Microsoft TechNet Security web site, http://www.microsoft.com/technet/security/default.asp

Obtaining Support on this Issue =============================== This is a fully supported patch. Information on contacting Microsoft Product Support Services is available at http://support.microsoft.com/support/contact/default.asp.

Acknowledgments =============== Microsoft thanks Rain Forest Puppy for reporting this issue to us and working with us to protect customers.

Revisions ========= - October 17, 2000: Bulletin Created.

- ------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

Last Updated October 17, 2000

(c) 2000 Microsoft Corporation. All rights reserved. Terms of use.

-----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.3

iQEVAwUBOexWdo0ZSRQxA/UrAQGn3AgApTo+/aJoiPnrfaKfRg/YZxVjBTENB3B9 aWuhZ/qUu3y9hccDmmT2PNSM/As9ZES/Zwm++MGPQOHOP8Ni86AQ9Mb6ETLEMKPT liALLfMMlOBmH7u2sUfHd8oFoR67kI51/1r/eU3EH6lWwuBhUcJRyrY4JInpPWV4 0AtL4FbMVyyLkT3H6lhuiY6yfnUUwLwtjcT+vhKB7GVedvHBYPCm7HdkrbrLhB76 tWU+R092Yysd+y0eR1uZaujgUamRrMh8DEfK6dZ0UonoTMizGYF+feZZFl/xfoq6 ta7gA1s5cde36Gu9zGB6NHIOaWxxavq70mU+aJUMQj42g9euaedqxw== =qj9c -----END PGP SIGNATURE-----

******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM The subject line and message body are not used in processing the request, and can be anything you like.

To verify the digital signature on this bulletin, please download our PGP key at http://www.microsoft.com/technet/security/notify.asp.

For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/technet/security/notify.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.

-----Original Message----- From: David Beierl [mailto:dbeierl@attglobal.net] Sent: Wednesday, December 13, 2000 11:49 PM To: Don & Christina Preston Cc: vanagon@GERRY.VANAGON.COM Subject: Re: Vanagon.com is hacked..

Straight from the horse's...er...mouth:

>ken >thank you for understand >ya i just want showing the site is vulnerable > >oh ya pls tell to the admin to patch the hole >get the patch from microsoft >tell to admin >to get MS00-078 patch > >best regards > >hiking

At 01:17 AM 12/14/2000, Don & Christina Preston wrote: >Very true. Just wanted to let Ron know that he can bring the site back up >while he finds the vulnerability. Ron if you like, I can run a scan on the >site and see if I can find it. (I'm a systems admin, so actually have some >experience in this area), although I make it a habit to ask permission first >;-)... > >Thanks, > >Don Preston >'87 Wolfy GL


Back to: Top of message | Previous page | Main VANAGON page

Please note - During the past 17 years of operation, several gigabytes of Vanagon mail messages have been archived. Searching the entire collection will take up to five minutes to complete. Please be patient!


Return to the archives @ gerry.vanagon.com


The vanagon mailing list archives are copyright (c) 1994-2011, and may not be reproduced without the express written permission of the list administrators. Posting messages to this mailing list grants a license to the mailing list administrators to reproduce the message in a compilation, either printed or electronic. All compilations will be not-for-profit, with any excess proceeds going to the Vanagon mailing list.

Any profits from list compilations go exclusively towards the management and operation of the Vanagon mailing list and vanagon mailing list web site.