-----Original Message----- From: UNIRAS (UK Govt CERT) [mailto:[EMAIL PROTECTED]] Sent: 18 April 2002 17:09 To: Undisclosed Recipients Subject: FW: UNIRAS Alert - 15/02 - UNIRAS - Multiple Vulnerabilities in Microsoft IIS Importance: High -----BEGIN PGP SIGNED MESSAGE----- - -----BEGIN PGP SIGNED MESSAGE----- - - ------------------------------------------------------------------------ ---------- UNIRAS (UK Govt CERT) Alert Notice - 15/02 dated 18.04.02 Time: 17:00 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre) - - ------------------------------------------------------------------------ ---------- UNIRAS material is also available from its website at www.uniras.gov.uk and Information about NISCC is available from www.niscc.gov.uk - - ------------------------------------------------------------------------ ---------- Title ===== Multiple Vulnerabilities in Microsoft IIS Details ============== Departmental and organisational security officers should be aware of the potential impact of the recently discovered vulnerabilities in Microsoft Internet Information Services (IIS) on internetworked systems described in UNIRAS Briefings (Microsoft) 096/02 and (Cisco) 101/02. These vulnerabilities could allow an attacker to run arbitrary code on the IIS server. Given the history of Internet worms such as Nimda propagating via IIS vulnerabilities, system administrators should ensure that they apply the relevant patch as soon as possible. Microsoft IIS 4.0, 5.0 and 5.1 running on Windows NT, 4.0, Windows 2000 And Windows XP are vulnerable. The patches for Microsoft can be downloaded from the following locations: Microsoft IIS 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37931 Microsoft IIS 5.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37824 Microsoft IIS 5.1: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=37857 A number of Cisco products are also vulnerable, namely: * Cisco CallManager 3.0, 3.1, 3.2 * Cisco ICS 7750 * Cisco Unity * Cisco Building Broadband Service Manager 4.x, 5.x * Cisco uOne Enterprise Edition * Cisco E-mail Manager (CEM) * Cisco Network Registrar (CNR) * Cisco Intelligent Contact Manager (ICM) * CiscoWorks 2000 RWAN/CWSI Campus v2.x (not supported) * Cisco Voice Manager v1.x (not supported) Affected Cisco customers should follow the advice in Cisco Security Advisory MS02-018 (republished as UNIRAS Briefing 101/02). Recipients of this email are advised to read and follow the advice in the following documents: Microsoft Security Bulletin MS02-18 (republished as UNIRAS Briefing 096/02) available at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/ security/bulletin/MS02-018.asp CERT Advisory CA-2002-09, available at http://www.cert.org/advisories/CA-2002-09.html - - ------------------------------------------------------------------------ ---------- For additional information or assistance, please contact the HELP Desk by telephone or Not Protectively Marked information may be sent via EMail to: [EMAIL PROTECTED] Tel: 020 7821 1330 Ext 4511 Fax: 020 7821 1686 - - ------------------------------------------------------------------------ ---------- UNIRAS wishes to acknowledge the contributions of Microsoft and Cisco for the information contained in this Alert. - - ------------------------------------------------------------------------ ---------- This Briefing contains the information released by the original author. Some of the information may have changed since it was released. If the vulnerability affects you, it may be prudent to retrieve the advisory from the canonical site to ensure that you receive the most current information concerning that problem. Reference to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by UNIRAS or NISCC. The views and opinions of authors expressed within this notice shall not be used for advertising or product endorsement purposes. Neither UNIRAS or NISCC shall also accept responsibility for any errors or omissions contained within this briefing notice. In particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information contained within this notice. UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) and has contacts with other international Incident Response Teams (IRTs) in order to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing amongst its members and the community at large. - - ------------------------------------------------------------------------ ---------- <End of UNIRAS Briefing> - -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQCVAwUBPJr37opao72zK539AQGW7gP+KbA5Gi/Q9yxsLNhBBXA7iL1KiXz5UZ6R 5FZH2VFubcF8cRVqPKvEWzf+qYILSFZSvYtVbMPuMvaEh1UJKNwjeZLziUBJK5hl r7M4G9SpdSQX1o8AgVXPYznya3B2WMDDqPdLqHbGGpyxw2WnYF5xxpeHEouYQhIX xUU28eKjnCA= =PU8x - -----END PGP SIGNATURE----- -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQCVAwUBPL7uuIpao72zK539AQEShgP8CdVVZ39oRcr1EmtSzj3dM+iR2rtuEdMb R3jUu3YUnIOEun1uKamZX0DEaPa2XnRKDFi7k8RlvnAZ6DM9V9yk8lQyi68Hh2qW PdEzKDn0YthnT3Zm4TCSamwzUSOhyTOu90JFsODCt5OxwvsOnZD+tlTJGns8dQ2I N74WOR+zSHg= =Jrkv -----END PGP SIGNATURE----- IWS INFOCON Mailing List @ IWS - The Information Warfare Site http://www.iwar.org.uk