CERT-In Vulnerability Note
CIVN-2010-0203
Multiple Vulnerabilities in Microsoft Internet Information Services (IIS)
Original Issue Date:September 16, 2010
Severity Rating: MEDIUM
Systems Affected
- Microsoft Windows XP Service Pack 3
- Microsoft Windows XP Professional x64 Edition Service Pack 2
- Microsoft Windows Server 2003 Service Pack 2
- Microsoft Windows Server 2003 x64 Edition Service Pack 2
- Microsoft Windows Server 2003 with SP2 for Itanium-based Systems
- Microsoft Windows Vista Service Pack 1 and Windows Vista Service Pack 2
- Microsoft Windows Vista x64 Edition Service Pack 1 and Service Pack 2
- Microsoft Windows Server 2008 for 32-bit Systems and Service Pack 2
- Microsoft Windows Server 2008 for x64-based Systems and Service Pack 2
- Microsoft Windows Server 2008 for Itanium-based Systems and Service ¿ Microsoft Windows 7 for 32-bit Systems
- Microsoft Windows 7 for x64-based Systems
- Microsoft Windows Server 2008 R2 for x64-based Systems
- Microsoft Windows Server 2008 R2 for Itanium-based Systems
Component Affected
- Microsoft Internet Information Services (IIS) version 5.1
- Microsoft Internet Information Services IIS version 6.0
- Microsoft Internet Information Services (IIS) version 7.0
- Microsoft Internet Information Services (IIS) version 7.5
Overview
Multiple vulnerabilities have been reported in Microsoft Internet Information Services (IIS) , which could be exploited by remote attackers to bypass certain restrictions, create a denial of service condition or can take complete control of the vulnerable system in context of logged in user.
Description
1. IIS Repeated Parameter Request Denial of Service Vulnerability
(
CVE-2010-1899
)
A denial of service vulnerability exists in Microsoft Internet Information Services (IIS) while processing HTTP request. An attacker could exploit the vulnerability by repeatedly sending specially crafted URL containing malicious HTTP POST requests to active server pages (.asp) on a Web site hosted by IIS. Successful exploitation of this vulnerability allow remote attacker to interrupt service and make the server un-responsive.
2. FastCGI Request Header Buffer Overflow Vulnerability
(
CVE-2010-2730
)
FastCGI for IIS enables is a application frameworks that support the FastCGI protocol to be hosted on the IIS Web server in a high-performance and reliable way. FastCGI provides a high-performance alternative to the Common Gateway Interface (CGI), a standard way of interfacing external applications with Web servers that has been supported as part of the IIS feature. A remote code execution vulnerability exists in Microsoft internet Information Services (IIS) when handling request headers to IIS servers with FastCGI enabled. An attacker could exploit this vulnerability by sending specially crafted HTTP requests to FastCGI enabled IIS servers . Successful exploitation of this vulnerability could allow remote attacker to over flow the buffer and execute arbitrary code and can take complete control of the vulnerable system.
3. Directory Authentication Bypass Vulnerability
(
CVE-2010-2731
)
A vulnerability is exists in Microsoft Internet Information Services (IIS) within the authentication process when granting accessing to protected folders and pages. An attacker exploit this vulnerability by sending a specially crafted URL containing malformed HTTP requests including the ":$i30:$INDEX_ALLOCATION" sequence appended to the folder name to bypass directory-based basic authentication and access resources .Successful exploitation of this vulnerability could allow remote attacker to gain unauthorized access could result in escalation of privileges.
Workaround
- Temporarily disable ASP on the IIS server
- Disable FastCGI if not required
- Install and use URL Scan.
Solution
Apply patches as mentioned in Microsoft Security bulletin
MS10-065
Microsoft Knowledge Base Article
2267960
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-065.mspx
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms10-065.mspx
Microsoft Knowledge Base Article 2267960
Aus CERT
http://www.auscert.org/render.html?it=13339
VUPEN
http://www.vupen.com/english/advisories/2010/2386
http://www.vupen.com/english/advisories/2010/1681
X-Force
http://xforce.iss.net/BulletinDetail.do?bn=MS10-065
Security Focus
http://www.securityfocus.com/bid/41314
Security Tracker
http://securitytracker.com/alerts/2010/Sep/1024440.html
Secunia
http://secunia.com/advisories/41375
CVE Name
CVE-2010-1899
CVE-2010-2730
CVE-2010-2731
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|