123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Microsoft Eschews Patch, Gives Exploit Code For Iis 5.0 Bug

Profile Picture
By Author: yvonne
Total Articles: 484
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Saying that an Internet Information Server exploit is due to a feature, not a flaw, Microsoft has published exploit code for the flaw but no workaround or patch.
The exploit, which was discovered on Dec. 15, 2006, and made a Exams public at the end of May, works against IIS 5.x. By design, versions 5.x allow bypass of basic authentication by using the "hit highlight" feature. The hit-highlighting feature can be used by an unauthorized user to grab documents to which he or she has no privileges.
At the very least, this leaves IIS 5.x users vulnerable to data interception. And while the exploit hasn't been used to take over systems to date, that could well change, according to Swa Frantzen of the Internet Storm Center.
The ability to execute code is "unexplored, but hinted about," Frantzen wrote in a blog post on SANS' Internet Storm Center security alert site.
The ISC has tracked public exploits that apparently focus on leaking protected information.
According to Microsoft, which has written up the issue in its Knowledge Base article 328832, hit-highlighting ...
... with Webhits.dll only relies on the Microsoft Windows NT ACL (Access Control List) configuration on 5.x versions.
Microsoft "strongly [recommends] that all users upgrade to IIS (Internet Information Services) version 6.0 running on Microsoft Windows Server 2003. IIS 6.0 significantly increases Web infrastructure security," the company wrote in its KB article.
Microsoft is currently shipping IIS 6.0 of the Internet Information Services Server for Windows Server 2003. Microsoft is up to IIS 7.0 for Windows Vista and IIS 5.1 for MCITP Enterprise Administrator Windows XP Professional.
What are the security issues with Microsoft's "Surface"?
Yet, in spite of urging upgrading in order to gain improved security, Microsoft is treating the bug as a nonissue, providing no workaround nor indications that it will patch versions 5.0 and 5.1. "This behavior is by design," the KB article asserts.
Rather than supply a patch or workaround, Microsoft published six steps to reproduce the exploit”a response that is "a bit atypical," according to Frantzen. "Microsoft is telling the world how to exploit their products being used by their customers. Not that the worst of those interested in it did not already know, but the one thing we need from Microsoft is not the exploit, but the patch or at least a decent work-around," Frantzen wrote.
The only defensive information Microsoft gives is to urge users to upgrade to 6.0”an upgrade that's neither free nor easy, Frantzen pointed out. He provided these possible workarounds:
If you don't use the Web hits functionality, a simple workaround would be to remove the script mapping for .htw files. Without a script mapping, IIS should treat the file as static content.
Try to use application-level firewalls (filters). If you have the infrastructure it can be a temporary measure till you can upgrade IIS, solving the actual problem.
URLScan, a URL filter by Microsoft can be used to stop access to .htw files and is reported by some SANS-ISC readers as being effective.
Manage rights on the confidential files or directories themselves.
Upgrade to Apache or another Web server, with or without a (cross) upgrade of the OS.
Scramble an upgrade to Windows 2003, potentially on more potent hardware.
Frantzen advised IIS 5.x mcsa users that failing to find "null.htw" in a document root directory doesn't mean much”the exploit doesn't need the file.
Microsoft hadn't delivered a statement by the time this story posted.

Total Views: 370Word Count: 557See All articles From Author

Add Comment

System/Network Administration Articles

1. Internet Download Manager Free Download
Author: Hack Guru

2. Gws Tele Services
Author: SENABEER

3. Acing The Pmp Exam: Your Guide To Pmp Mock Tests And Certification In Ontario, Canada
Author: Mockcertified

4. Understanding The Core Functions Of Military Ethernet Switches: A Comprehensive Overview
Author: R.W. Tull

5. Discover The 9 Best Free Snapchat Alternatives [2023]
Author: nagababu

6. What Are Some Alternatives To Oracle Sql Developer?
Author: Rapidflow Inc

7. Advantages And Applications Of Cat6a Patch Cables
Author: Ryan

8. Navigating Technological Landscapes: Unleashing Strategic It Consultancy Services In The Uae With Tls-it
Author: TLS-IT

9. Leading Cyber Security Awareness Training Solutions
Author: Phriendly Phishing

10. New Era Of It Infrastructure Managed Services In Oman : Seamless Management, Maximum Uptime
Author: Tech It Support

11. Unraveling The Basics Of Infrastructure Management
Author: Rapidflow Inc.

12. Supercharging Your Database: Why Rapidflow Inc. Rocks With Oracle Database Help
Author: Rapidflow Inc

13. Boingo Wireless Launches First Wi-fi 7 Public Venue Network
Author: Orson Amiri

14. Exploring The Performance Aspect With Gold Alloys In Pcbs
Author: Ryan

15. Know About Rgb And Color Mixing In Led Pcb
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: