watch out for this guys:

http://www.eeye.com/database/advisories/ad06081999/ad06081999-exploit.html

and this is  Microsoft's answer:

> The following is a Security  Bulletin from the Microsoft Product Security
> Notification Service.
>
> Please do not  reply to this message,  as it was sent  from an unattended
> mailbox.
>                     ********************************
>
> Microsoft Security Bulletin (MS99-019)
> --------------------------------------
>
> Workaround Available for "Malformed HTR Request" Vulnerability
>
> Originally Posted: June 15, 1999
>
> Summary
> =======
> Microsoft has released a patch that eliminates a vulnerability in
Microsoft
> (r) Internet  Information Server 4.0. The vulnerability could allow denial
> of service attacks against an IIS  server or, under certain conditions,
> could allow arbitrary code to be run on the server.
>
> Microsoft has issued this bulletin to advise customers of steps they can
> take to protect  themselves against this vulnerability. A patch to
eliminate
> this vulnerability is being  developed, and an update to this bulletin
will
> be released to advise customers when it is  available.
>
> Issue
> =====
> IIS supports several file types that require server-side processing. When
a
> web site visitor  requests a file of one of these types, an appropriate
> filter DLL processes it. A vulnerability  exists in ISM.DLL, the filter
DLL
> that processes .HTR files. HTR files enable remote  administration of user
> passwords.
>
> The vulnerability involves an unchecked buffer in ISM.DLL. This poses two
> threats to safe  operation. The first is a denial of service threat. A
> malformed request for an .HTR file could  overflow the buffer, causing IIS
> to crash. The server would not need to be rebooted, but IIS  would need to
> be restarted. The second threat would be more difficult to exploit. A
> carefully-constructed file request could cause arbitrary code to execute
on
> the server via a  classic buffer overrun technique. Neither scenario could
> occur accidentally. This vulnerability  does not involve the functionality
> of the password administration features of .HTR files.
>
> While there are no reports of customers being adversely affected by this
> vulnerability, Microsoft  is proactively releasing this bulletin to allow
> customers to take appropriate action to protect  themselves against it.
>
> Affected Software Versions
> ==========================
>  - Microsoft Internet Information Server 4.0
>
> What Microsoft is Doing
> =======================
> Microsoft has provided a workaround that fixes the problem identified. The
> workaround is  discussed below in What Customers Should Do.
>
> Microsoft also has sent this security bulletin to customers
> subscribing to the Microsoft Product Security Notification Service.
> See http://www.microsoft.com/security/services/bulletin.asp for more
> information about this free customer service.
>
> What Customers Should Do
> ========================
> Microsoft highly recommends that customers disable the script mapping for
> .HTR files as follows:
>  - From the desktop, start the Internet Service Manager
>    by clicking Start | Programs | Windows NT 4.0 Option
>    Pack | Microsoft Internet Information Server | Internet
>    Service Manager
>  - Double-click "Internet Information Server"
>  - Right-click on the computer name and select Properties
>  - In the Master Properties drop-down box, select "WWW Service",
>    then click the "Edit" button .
>  - Click the "Home Directory" tab, then click the "Configuration"
>    button .
>  - Highlight the line in the extension mappings that contains ".HTR",
>    then click the "Remove" button.
>  - Respond "yes" to "Remove selected script mapping?" say yes,
>    click OK 3 times, close ISM
>
> A patch will be available shortly to eliminate the vulnerability
altogether.
>
> Customers should monitor http://www.microsoft.com/security for an
> announcement when the patches are available.
>
> Microsoft recommends that customers review the IIS Security Checklist at
> http://www.microsoft.com/security/products/iis/CheckList.asp
>
> More Information
> ================
> Please see the following references for more information related to this
> issue.
>  - Microsoft Security Bulletin MS99-019,
>    Workaround Available for "Malformed HTR Request" Vulnerability
>    (The Web-posted version of this bulletin),
>    http://www.microsoft.com/security/bulletins/ms99-019.asp.
>  - IIS Security Checklist,
>    http://www.microsoft.com/security/products/iis/CheckList.asp
>
> Obtaining Support on this Issue
> ===============================
> If you require technical assistance with this issue, please contact
> Microsoft Technical Support. For information on contacting Microsoft
> Technical Support, please see
> http://support.microsoft.com/support/contact/default.asp.
>
> Revisions
> =========
>  - June 15, 1999: Bulletin Created.
>
>
>
> For additional security-related information about Microsoft products,
> please visit http://www.microsoft.com/security
>
>
> ------------------------------------------------------------------
>
> THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS
IS"
> WITHOUT WARRANTY OF  ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
> EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES  OF MERCHANTABILITY AND
FITNESS
> FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION  OR ITS
> SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
> INCIDENTAL,  CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
> EVEN IF MICROSOFT CORPORATION OR ITS  SUPPLIERS HAVE BEEN ADVISED OF THE
> POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE  EXCLUSION OR
> LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
> FOREGOING  LIMITATION MAY NOT APPLY.
>
> (c) 1999 Microsoft Corporation. All rights reserved. Terms of Use.
>
>    *******************************************************************
> You have received  this e-mail bulletin as a result  of your registration
> to  the   Microsoft  Product  Security  Notification   Service.  You  may
> unsubscribe from this e-mail notification  service at any time by sending
> an  e-mail  to  [EMAIL PROTECTED]
> The subject line and message body are not used in processing the request,
> and can be anything you like.
>
> For  more  information on  the  Microsoft  Security Notification  Service
> please    visit    http://www.microsoft.com/security/bulletin.htm.    For
> security-related information  about Microsoft products, please  visit the
> Microsoft Security Advisor web site at http://www.microsoft.com/security.
>


regards,

Francisco Lopez
SysAdmin & Networks Engineer


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to