exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ms00-010

ms00-010
Posted Feb 23, 2000

Microsoft has released a patch for a vulnerability in web applications associated with Microsoft Site Server 3.0, Commerce Edition. These applications are provided as samples and generated by wizards, who have unwisely allowed inappropriate access to a database on the site. Microsoft FAQ on this issue here.

tags | web
SHA-256 | f0ea22e2f6fcdb79f7f031cffdb3d616b72c3db091aa09ad12853c262adf569b

ms00-010

Change Mirror Download
Microsoft Security Bulletin (MS00-010)
--------------------------------------

Patch Available for "Site Wizard Input Validation" Vulnerability
Originally Posted: February 18, 2000

Summary
=======
Microsoft has released a patch that eliminates a security vulnerability
in web applications associated with Microsoft® Site Server 3.0, Commerce
Edition. These applications are provided as samples and generated by
wizards, but do not follow security best practices. If deployed on a
web site, they could allow inappropriate access to a database on the
site. Frequently asked questions regarding this vulnerability and the
patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-010.asp.

Issue
=====
Two sample web sites provided as part of Site Server 3.0, Commerce
Edition do not follow security best practices; the code generated by
one of the wizards is affected by the same problem. The code requests
an identification number as one of the inputs, but does not validate
it before using it in a database query. As a result, a malicious user
could, instead of entering an appropriate input, provide SQL commands.
If this were done, the SQL commands would be executed as part of the
query, and could be used to create, modify, delete or read data in the
database.

The vulnerability only affects sites that have either deployed the code
at issue here, or have used the code as a model for developing custom code.
Customers who have deployed the code should apply the patch to ensure that
security best practices are followed. Customers who have used the code as a
guide in developing their own should refer to the Knowledge Base article
referenced below for specific code changes.

Affected Software Versions
==========================
Microsoft Site Server 3.0, Commerce Edition

Patch Availability
==================
http://www.microsoft.com/downloads/Release.asp?ReleaseID=18767

NOTE: Additional security patches are available at the Microsoft Download
Center

More Information
================
Please see the following references for more information related to this
issue.
- Frequently Asked Questions: Microsoft Security Bulletin MS00-010,
http://www.microsoft.com/technet/security/bulletin/fq00-010.asp
- Microsoft TechNet Security Web site,
http://www.microsoft.com/technet/security/default.asp

Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Technical Support is available at
<http://support.microsoft.com/support/contact/default.asp>.

Acknowledgments
===============
Microsoft thanks </technet/security/bulletin/policy.asp> Nick Southwell
of Creative Online Media for reporting this problem to us and working
with us to protect customers.

Revisions
=========
* February 18, 2000: Bulletin Created.

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS
IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES,
EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT
CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER
INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY
NOT APPLY.

Last updated Friday, February 18, 2000
© 2000 Microsoft Corporation. All rights reserved. Terms of use

*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.

For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/security/services/bulletin.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.

Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    39 Files
  • 7
    Jun 7th
    22 Files
  • 8
    Jun 8th
    17 Files
  • 9
    Jun 9th
    20 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close