-----Original Message-----
From: UNIRAS (UK Govt CERT)
Sent: 02 July 2002 09:40
To: Undisclosed Recipients
Subject: UNIRAS Briefing - 197/02 - Microsoft - Heap Overrun in HTR
Chunked Encoding Could Enable Web Server Compromise (Revision to UNIRAS
Briefing 184/02)
Importance: High



-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------------
----
   UNIRAS (UK Govt CERT) Briefing Notice - 197/02 dated 02.07.02  Time: 09:38
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ------------------------------------------------------------------------------
----
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ------------------------------------------------------------------------------
----

Title
=====

Microsoft Security Bulletin - MS02-028 (Revision to UNIRAS Briefing 184/02):
Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise

Detail
======

- -----BEGIN PGP SIGNED MESSAGE-----

- - -
- - ----------------------------------------------------------------------
Title:      Heap Overrun in HTR Chunked Encoding Could Enable Web
            Server Compromise (Q321599)
Released:   12 June 2002
Revised:    01 July 2002 (version 2.0)
Software:   Internet Information Server
Impact:     Run Code of Attacker's Choice
Max Risk:   Critical
Bulletin:   MS02-028

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-028.asp.
- - -
- - ----------------------------------------------------------------------

Reason for Revision:
====================
On June 12, 2002, Microsoft released the original version of this
bulletin. On July 1, 2002, the bulletin was updated to revise the
severity rating. Specifically, Microsoft has increased the severity
rating of this issue to "critical ." The revision is in response to a
significant change in the threat environment due to an increased
focus on chunked encoding vulnerabilities in general, and the
discovery of hostile code attempting to exploit similar
vulnerabilities on other platforms. Customers who have already
disabled HTR or applied this patch need not take any action.
Customers who have not disabled HTR should do so as soon as
possible. Alternately, customers who cannot disable HTR should
apply the patch immediately.

Issue:
======
This patch eliminates a newly discovered vulnerability affecting
Internet Information Services. Although Microsoft typically delivers
cumulative patches for IIS, in this case we have delivered a patch
that eliminates only this new vulnerability, while completing a
cumulative patch. When the cumulative patch is customer-ready, we
will update this bulletin with information on its availability. The
FAQ provides information on the circumstances surrounding the
vulnerability, and why we believe releasing a singleton patch
immediately is in customers' best interests. To ensure that servers
are fully protected against past as well as current vulnerabilities,
we strongly recommend installing the previous cumulative patch
(discussed in Microsoft Security Bulletin MS02-018) before
installing this patch.

The vulnerability is similar to the first vulnerability discussed
in Microsoft Security Bulletin MS02-018. Like that vulnerability,
this one involves a buffer overrun in the Chunked Encoding data
transfer mechanism in IIS 4.0 and 5.0, and could likewise be used
to overrun heap memory on the system, with the result of either
causing the IIS service to fail or allowing code to be run on the
server. The chief difference between the vulnerabilities is that
the newly discovered one lies in the ISAPI extension that
implements HTR - an older, largely obsolete scripting technology -
where the previous one lay in the ISAPI extension that implements
ASP.

Mitigating Factors:
====================
 - Microsoft has long recommended disabling HTR functionality
   unless there is a business-critical reason for retaining it.
   Systems on which HTR is disabled would not be at risk from this
   vulnerability.

 - The IIS Lockdown Tool disables HTR by default in all server
   configurations.

 - The current version of the URLScan tool provides a means of
   blocking chunked encoding transfer requests by default.

 - On default installations of IIS 5.0, exploiting the
   vulnerability to run code would grant the attacker the privileges
   of the IWAM_computername account, which has only the privileges
   commensurate with those of an interactively logged-on
   unprivileged user.

Risk Rating:
============
 - Internet systems: Critical
 - Intranet systems: Critical
 - Client systems: Critical

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the
   Security Bulletin at
   http://www.microsoft.com/technet/security/bulletin/ms02-028.asp
   for information on obtaining this patch.

Acknowledgment:
===============
 - eEye Digital Security (http://www.eeye.com/)

- - -
- - ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT
ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

- -----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPSDcFI0ZSRQxA/UrAQFOGQgApiLeKU6152INPuPhROJLkJf5hR/YSB49
6Y21xuegR5M2JscjPnxi+rjYBKuOofjQM+0HRm/urZ4MCxEv6p3os1rCw0YmyqIt
v0U59t1dLUUNycO7doIPWjCVgILQGBsoQzZkIQ3799WJewzU8UBlfHiyZ5lInq0I
6O7b3VFU5jLKHPeE7XQfdjm1QXlYkA8klqEWmVMQu7HYGxD20MNn0huLPEprs1aL
UVfcNdry2PJ1Cuh3m0uYYP/6hlySNktmnBwj9OPRAHWolHlLSNoQdAII5VbwWHdW
cM/EJ2Etib0vVmgszl+3DbHL+d9ZV3cacJ0K7YrBgnd5GBSZ2DWmSg==
=DnVB
- -----END PGP SIGNATURE-----

 *******************************************************************

Reprinted with permission of Microsoft Corporation.
- ------------------------------------------------------------------------------
----

For additional information or assistance, please contact the HELP Desk by
telephone or Not Protectively Marked information may be sent via EMail to:

[EMAIL PROTECTED]
Tel: 020 7821 1330 Ext 4511
Fax: 020 7821 1686

- ------------------------------------------------------------------------------
----
UNIRAS wishes to acknowledge the contributions of Microsoft for the information
contained in this Briefing.
- ------------------------------------------------------------------------------
----
This Briefing contains the information released by the original author. Some
of the information may have changed since it was released. If the vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical site
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views
and opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they shall
not be liable for any loss or damage whatsoever, arising from or in connection
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- ------------------------------------------------------------------------------
----
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQCVAwUBPSFmq4pao72zK539AQGQEgQAj3fGuWHtcLPhaOIBOy5HsHOGmvgwLP26
yf/tXM41C/UljNTA9FPdzeOFMSym0WopVN8vKHiUCnrlY/j9c3HkokRdUz9/PilU
SiZ4jZlbdEY4ofNe1V6Zl0iMrWxqbGUhz0Zwsgq1Uv6YgNh4eblfPoiKMsSbDxxk
wT9kQl0yR6Y=
=aYXO
-----END PGP SIGNATURE-----




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to