-----Original Message-----
From: UNIRAS (UK Govt CERT) [mailto:[EMAIL PROTECTED]]
Sent: 18 April 2002 17:09
To: Undisclosed Recipients
Subject: FW: UNIRAS Alert - 15/02 - UNIRAS - Multiple Vulnerabilities in
Microsoft IIS
Importance: High


-----BEGIN PGP SIGNED MESSAGE-----

- -----BEGIN PGP SIGNED MESSAGE-----

- - ------------------------------------------------------------------------
----------
   UNIRAS (UK Govt CERT) Alert Notice - 15/02 dated 18.04.02  Time: 17:00
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination
Centre)
- - ------------------------------------------------------------------------
----------
  UNIRAS material is also available from its website at www.uniras.gov.uk
and
         Information about NISCC is available from www.niscc.gov.uk
- - ------------------------------------------------------------------------
----------

Title
=====

Multiple Vulnerabilities in Microsoft IIS

Details
==============

Departmental and organisational security officers should be aware of
the potential impact of the recently discovered vulnerabilities in
Microsoft Internet Information Services (IIS) on internetworked systems
described in UNIRAS Briefings (Microsoft) 096/02 and (Cisco) 101/02.
These vulnerabilities could allow an attacker to run arbitrary code
on the IIS server. Given the history of Internet worms such as Nimda
propagating via IIS vulnerabilities, system administrators should ensure
that they apply the relevant patch as soon as possible.

Microsoft IIS 4.0, 5.0 and 5.1 running on Windows NT, 4.0, Windows 2000
And Windows XP are vulnerable.

The patches for Microsoft can be downloaded from the following locations:

Microsoft IIS 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37931
Microsoft IIS 5.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37824
Microsoft IIS 5.1:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37857

A number of Cisco products are also vulnerable, namely:

 * Cisco CallManager 3.0, 3.1, 3.2

  * Cisco ICS 7750

  * Cisco Unity

  * Cisco Building Broadband Service Manager 4.x, 5.x

  * Cisco uOne Enterprise Edition

  * Cisco E-mail Manager (CEM)

  * Cisco Network Registrar (CNR)

  * Cisco Intelligent Contact Manager (ICM)

  * CiscoWorks 2000 RWAN/CWSI Campus v2.x (not supported)

  * Cisco Voice Manager v1.x (not supported)

Affected Cisco customers should follow the advice in Cisco Security
Advisory MS02-018 (republished as UNIRAS Briefing 101/02).

Recipients of this email are advised to read and follow the advice
in the following documents:

Microsoft Security Bulletin MS02-18 (republished as UNIRAS Briefing
096/02) available at
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/
security/bulletin/MS02-018.asp

CERT Advisory CA-2002-09, available at
http://www.cert.org/advisories/CA-2002-09.html

- - ------------------------------------------------------------------------
----------

For additional information or assistance, please contact the HELP Desk by
telephone or Not Protectively Marked information may be sent via EMail to:

[EMAIL PROTECTED]
Tel: 020 7821 1330 Ext 4511
Fax: 020 7821 1686

- - ------------------------------------------------------------------------
----------
UNIRAS wishes to acknowledge the contributions of Microsoft and Cisco for
the
information contained in this Alert.
- - ------------------------------------------------------------------------
----------
This Briefing contains the information released by the original author. Some
of the information may have changed since it was released. If the
vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical
site
to ensure that you receive the most current information concerning that
problem.

Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views
and opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall
not be liable for any loss or damage whatsoever, arising from or in
connection
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to
prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- - ------------------------------------------------------------------------
----------
<End of UNIRAS Briefing>
- -----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQCVAwUBPJr37opao72zK539AQGW7gP+KbA5Gi/Q9yxsLNhBBXA7iL1KiXz5UZ6R
5FZH2VFubcF8cRVqPKvEWzf+qYILSFZSvYtVbMPuMvaEh1UJKNwjeZLziUBJK5hl
r7M4G9SpdSQX1o8AgVXPYznya3B2WMDDqPdLqHbGGpyxw2WnYF5xxpeHEouYQhIX
xUU28eKjnCA=
=PU8x
- -----END PGP SIGNATURE-----


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQCVAwUBPL7uuIpao72zK539AQEShgP8CdVVZ39oRcr1EmtSzj3dM+iR2rtuEdMb
R3jUu3YUnIOEun1uKamZX0DEaPa2XnRKDFi7k8RlvnAZ6DM9V9yk8lQyi68Hh2qW
PdEzKDn0YthnT3Zm4TCSamwzUSOhyTOu90JFsODCt5OxwvsOnZD+tlTJGns8dQ2I
N74WOR+zSHg=
=Jrkv
-----END PGP SIGNATURE-----




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to