<H1>Vulnerability Note VU#117394</H1>
<H2>Buffer Overflow in Microsoft IIS 5.0</H2><A name=overview>
<H3>Overview</H3></A>A buffer overflow vulnerability exists in Microsoft IIS 5.0 running on Microsoft Windows 2000. IIS 5.0 is installed and running by default on Microsoft Windows 2000 server systems. This vulnerability may allow a remote attacker to run arbitrary code on the victim machine.
<P>An exploit is publicly available for this vulnerability, which increases the urgency that system administrators apply a patch. <A name=description>
<H3>I. Description</H3></A>IIS 5.0 includes support for WebDAV, which allows users to manipulate files stored on a web server (RFC2518). A buffer overflow vulnerability exists in ntdll.dll (a portion of code utilized by the IIS WebDAV component). By sending a specially crafted request to an IIS 5.0 server, an attacker may be able to execute arbitrary code in the Local System security context, essentially giving the attacker compete control of the system. <A name=impact>
<H3>II. Impact</H3></A>Any attacker who can reach a vulnerable web server can gain complete control of the system and execute arbitrary code in the Local System security context. Note that this may be significantly more serious than a simple "web defacement." <A name=solution>
<H3>III. Solution</H3></A><B>Apply a patch from your vendor</B>
<P><BR>A patch is available from Microsoft at<BR><BR><A href="http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=en">http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=en</A> <BR><BR><B>Disable vulnerable service</B><BR><BR>Until a patch can be applied, you may wish to disable IIS. To determine if IIS is running, Microsoft recommends the following:<BR><BR>Go to "Start | Settings | Control Panel | Administrative Tools | Services". If the "World Wide Web Publishing" service is listed then IIS is installed<BR><BR>To disable IIS, run the IIS lockdown tool. This tool is available here:<BR><BR><A href="http://www.microsoft.com/downloads/release.asp?ReleaseID=43955">http://www.microsoft.com/downloads/release.asp?ReleaseID=43955</A><BR><BR>If you cannot disable IIS, consider using the IIS lockdown tool to disable WebDAV (removing WebDAV can be specified when running the IIS lockdown tool). Alternatively, you can disable WebDAV by following the instructions located in Microsoft's Knowledgebase Article 241520, "How to Disable WebDAV for IIS 5.0":<BR><BR><A href="http://support.microsoft.com/default.aspx?scid=kb;en-us;241520">http://support.microsoft.com/default.aspx?scid=kb;en-us;241520</A><BR><BR><B>Restrict buffer size</B><BR><BR>If you cannot use either IIS lockdown tool or URLScan, consider restricting the size of the buffer IIS utilizes to process requests by using Microsoft's URL Buffer Size Registry Tool. This tool can be run against a local or remote Windows 2000 system running Windows 2000 Service Pack 2 or Service Pack 3. The tool, instructions on how to use it, and instructions on how to manually make changes to the registry are available here:<BR><BR>URL Buffer Size Registry Tool - <A href="http://go.microsoft.com/fwlink/?LinkId=14875">http://go.microsoft.com/fwlink/?LinkId=14875</A><BR>Microsoft Knowledge Base Article 816930 - <A href="http://support.microsoft.com/default.aspx?scid=kb;en-us;816930">http://support.microsoft.com/default.aspx?scid=kb;en-us;816930</A><BR>Microsoft Knowledge Base Article 260694 - <A href="http://support.microsoft.com/default.aspx?scid=kb;en-us;260694">http://support.microsoft.com/default.aspx?scid=kb;en-us;260694</A><BR><BR>You may also wish to use URLScan, which will block web requests that attempt to exploit this vulnerability. Information about URLScan is available at:<BR><BR><A href="http://support.microsoft.com/default.aspx?scid=kb;[LN];326444"><FONT color=#0000ff>http://support.microsoft.com/default.aspx?scid=kb;[LN];326444 </FONT></A><BR><A name=systems>
<H3>Systems Affected</H3></A>
<TABLE>
<TBODY>
<TR>
<TH align=left>Vendor</TH>
<TH align=left>Status</TH>
<TH>Date Updated</TH></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/IAFY-5KQQRE">Microsoft Corporation</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR></TBODY></TABLE><A name=references>
<H3>References</H3></A><BR><BR><A href="http://www.microsoft.com/windows2000/technologies/web/default.asp">http://www.microsoft.com/windows2000/technologies/web/default.asp</A><BR><A href="http://www.ietf.org/rfc/rfc2518.txt">http://www.ietf.org/rfc/rfc2518.txt</A><BR><A href="http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-007.asp">http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-007.asp</A><BR><A href="http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=en">http://microsoft.com/downloads/details.aspx?FamilyId=C9A38D45-5145-4844-B62E-C69D32AC929B&displaylang=en</A><BR><A href="http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-007.asp">http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms03-007.asp</A><BR><A href="http://www.microsoft.com/downloads/release.asp?ReleaseID=43955">http://www.microsoft.com/downloads/release.asp?ReleaseID=43955</A><BR><A href="http://support.microsoft.com/default.aspx?scid=kb;en-us;241520">http://support.microsoft.com/default.aspx?scid=kb;en-us;241520</A><BR><A href="http://support.microsoft.com/default.aspx?scid=kb;%5BLN%5D;326444">http://support.microsoft.com/default.aspx?scid=kb;%5BLN%5D;326444</A><BR><A href="http://go.microsoft.com/fwlink/?LinkId=14875">http://go.microsoft.com/fwlink/?LinkId=14875</A><BR><A href="http://support.microsoft.com/default.aspx?scid=kb;en-us;816930">http://support.microsoft.com/default.aspx?scid=kb;en-us;816930</A><BR><A href="http://support.microsoft.com/default.aspx?scid=kb;en-us;260694">http://support.microsoft.com/default.aspx?scid=kb;en-us;260694</A> <A name=credit>
<H3>Credit</H3></A>
<P>
<P>This document was written by Ian A Finlay. <A name=other>
<H3>Other Information</H3></A>
<TABLE>
<TBODY>
<TR>
<TD align=right>Date Public</TD>
<TD>03/17/2003</TD></TR>
<TR>
<TD align=right>Date First Published</TD>
<TD>03/17/2003 02:26:26 PM</TD></TR>
<TR>
<TD align=right>Date Last Updated</TD>
<TD>03/17/2003</TD></TR>
<TR>
<TD align=right>CERT Advisory</TD>
<TD><A href="http://www.cert.org/advisories/CA-2003-09.html">CA-2003-09</A></TD></TR>
<TR>
<TD align=right>CVE Name</TD>
<TD><A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0109">CAN-2003-0109</A></TD></TR>
<TR>
<TD align=right>Metric</TD>
<TD>112.50</TD></TR>
<TR>
<TD align=right>Document Revision</TD>
<TD>4</TD></TR></TBODY></TABLE>
<P> </P>
<P> </P>
<P> </P>
<P><A href="http://www.kb.cert.org/vuls/id/117394">http://www.kb.cert.org/vuls/id/117394</A></P><p><br><hr size=1><b><a href="http://br.busca.yahoo.com/">Busca Yahoo! </a></b><br>
O serviço de busca mais completo da Internet. O que você pensar o Yahoo! encontra.