exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ms.personal.webserver.txt

ms.personal.webserver.txt
Posted Aug 17, 1999

Microsoft has released a patch for the File Access Vulnerability in Personal Web Server. All relevant details included in file.

tags | exploit, web
SHA-256 | 62be2fea91fac4e6a6260bc674edeffa01aa449c0d036d00b77909e2b3807d42

ms.personal.webserver.txt

Change Mirror Download
Date: Sat, 27 Mar 1999 11:29:56 -0800
From: aleph1@UNDERGROUND.ORG
To: BUGTRAQ@netspace.org
Subject: Microsoft Security Bulletin (MS99-010)

The following is a Security Bulletin from the Microsoft Product Security
Notification Service.

Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************

Microsoft Security Bulletin (MS99-010)
--------------------------------------

Patch Available for File Access Vulnerability in Personal Web Server

Originally Posted: March 26, 1999

Summary
=======
Microsoft has released a patch that eliminates a vulnerability in certain
versions of Personal Web Server running under Windows (c) 95 or Windows 98,
which could allow files on the server to be read by an unauthorized user
who knew the name of the file and requested it via a specific non-standard
URL. Users running web server products on Microsoft Windows NT (c) are not
affected.

A fully supported patch is available to fix this vulnerability, and
Microsoft recommends that customers download and install it if appropriate.


Issue
=====
This vulnerability allows a file request that uses a non-standard URL to
bypass the server's normal file access controls. The file must be
specifically requested by name, so the requester would need to know the
name of the file or correctly guess it. The vulnerability would allow files
on the server to be read, but not changed or deleted, and would not allow
new files to be written to the server. The vulnerability does not usurp any
administrative privileges on the server.

Although some of the affected products are provided as part of Windows 95
and 98, none are turned on by default. Further, none of the affected
products exhibit the vulnerability when run on Windows NT. While there have
not been any reports of customers being adversely affected by these
problems, Microsoft is releasing a patch to proactively address this issue.

Affected Software Versions
==========================
This vulnerability involves two different products with similar names:
Microsoft (r) Personal Web Server and FrontPage (r) Personal Web Server.
The products can be installed on Windows 95, 98 or Windows NT; however,
none of the products are affected by this vulnerability if installed on
Windows NT.

- Microsoft Personal Web Server is available as part
of Windows 98 and the Windows NT Option Pack (which
can be installed on Windows 95 and 98, as well as
Windows NT). Microsoft Personal Web Server 4.0 is
the only version affected by the vulnerability.
- There is only one version of FrontPage Personal Web Server,
which shipped as part of Microsoft FrontPage 1.1, FrontPage 97,
and FrontPage 98. It is affected by this vulnerability.

Note: Most FrontPage users will not be affected by this vulnerability.
FrontPage 97 and 98 include two personal web servers - FrontPage Personal
Web Server and Microsoft Personal Web Server 2.0 - and by default install
the latter, which is not affected by the vulnerability. FrontPage 1.1 does
install the FrontPage Personal Web Server by default.

What Microsoft is Doing
=======================
Microsoft has released patches that fix the problem identified. The patches
are available for download from the sites listed below in What Customers
Should Do.

Microsoft also has sent this security bulletin to customers
subscribing to the Microsoft Product Security Notification Service.
See http://www.microsoft.com/security/services/bulletin.asp for
more information about this free customer service.

Microsoft has published the following Knowledge Base (KB) articles on this
issue:
- Microsoft Knowledge Base (KB) article Q216453,
FP98: Security Patch for FrontPage Personal Web Server,
http://support.microsoft.com/support/kb/articles/q216/4/53.asp.
- Microsoft Knowledge Base (KB) article Q217765,
FP97: Security Patch for FrontPage Personal Web Server,
http://support.microsoft.com/support/kb/articles/q217/7/65.asp.
- Microsoft Knowledge Base (KB) article Q217763,
File Access Vulnerability in Personal Web Server,
http://support.microsoft.com/support/kb/articles/q217/7/63.asp

(Note: It might take 24 hours from the original posting of this bulletin for
the KB articles to be visible in the Web-based Knowledge Base.)

What Customers Should Do
========================
Microsoft highly recommends that customers evaluate the degree of risk that
this vulnerability poses to their systems and determine whether to download
and install the patch. The only customers who may be affected by this
vulnerability are those who use Windows 95 or 98 to host a personal web
site. As noted above, Windows NT users who host personal web sites are not
affected by this vulnerability.

If you are using Windows 95 or 98 to host a personal web site but have never
installed FrontPage:
You are running Microsoft Personal Web Server. Only version
4.0 requires a patch. To determine whether you are running
version 4.0, right-click on the Personal Web Server icon in
the Windows taskbar system tray (next to the System Clock) and
choose Properties. If a dialog box titled "Personal Web Manager"
appears, then you are running Microsoft Personal Web Server 4.0
and need to install the patch located at
http://support.microsoft.com/download/support/mslfiles/Pwssecup.exe.
If the title is anything other than "Personal Web Manager", you
do not need the patch.

If you are using Windows 95 or 98 to host a personal web site and have
installed FrontPage:
As detailed in Affected Software Versions, most users of Microsoft
FrontPage are not affected by this vulnerability. Use the following
guidelines to determine if you need this patch:

If you are using FrontPage 98:

1. Start FrontPage, then open a web site on the local machine
by selecting the Open FrontPage Web command from the File menu.
2. On the Tools Menu, select Web Settings. Select the Configuration tab.
3. If the value in the "Server Version" field reads "Microsoft-IIS/4.0",
Microsoft Personal Web Server 4.0 is installed and you should
apply the patch located at
http://support.microsoft.com/download/support/mslfiles/Pwssecup.exe.
4. If the value in the "Server Version" field reads
"FrontPage-PWS32/X.X.X.XXXX" (where the Xs signify any digit), the
FrontPage Personal Web Server is installed and you should install
the patch for FrontPage 98 users of the FrontPage Personal Web Server
located at
http://officeupdate.microsoft.com/downloadDetails/fppws98.htm.
5. If the value in the "Server Version" field is any other value, you
do not need the patch.

If you are using FrontPage 97:

1. Start FrontPage, then open a web site on the local machine by
selecting the Open FrontPage Web command from the File menu.
2. On the Tools Menu, select Web Settings. Select the Configuration tab.
3. If the value in the "Server Version" field reads "Microsoft-IIS/4.0",
Microsoft Personal Web Server 4.0 is installed and you should
apply the patch at located at
http://support.microsoft.com/download/support/mslfiles/Pwssecup.exe.
4. If the value in the "Server Version" field reads
"FrontPage-PWS32/X.X.X.XXXX" (where the Xs signify any digit), the
FrontPage Personal Web Server is installed and you should upgrade to
Microsoft Personal Web Server 4.0, which can be downloaded from
http://www.microsoft.com/windows/ie/pws/default.htm, then install
the patch for Microsoft Personal Web Server 4.0 located at
http://support.microsoft.com/download/support/mslfiles/Pwssecup.exe.
(Users needing remote authoring should follow a different upgrade
path, detailed in Microsoft Knowledge Base Article Q217765,
FP97: Security Patch for FrontPage Personal Web Server,
http://support.microsoft.com/support/kb/articles/q217/7/65.asp)
5. If the value in the "Server Version" field is any other value, you
do not need the patch.

If you are using FrontPage 1.1:

You need to upgrade to Microsoft Personal Web Server 4.0, which can be
downloaded from http://www.microsoft.com/windows/ie/pws/default.htm,
then install the patch for Microsoft Personal Web Server 4.0 located at
http://support.microsoft.com/download/support/mslfiles/Pwssecup.exe.

More Information
================
Please see the following references for more information related to this
issue.
- Microsoft Security Bulletin MS99-010,
Patch Available for File Access Vulnerability in Personal
Web Server (the Web-posted version of this bulletin),
http://www.microsoft.com/security/bulletins/ms99-010.asp.
- Microsoft Knowledge Base Article Q216453,
FP98: Security Patch for FrontPage Personal Web Server,
http://support.microsoft.com/support/kb/articles/q216/4/53.asp
- Microsoft Knowledge Base Article Q217765,
FP97: Security Patch for FrontPage Personal Web Server,
http://support.microsoft.com/support/kb/articles/q217/7/65.asp
- Microsoft Knowledge Base Article Q217763,
File Access Vulnerability in Personal Web Server,
http://support.microsoft.com/support/kb/articles/q217/7/63.asp

(Note: It might take 24 hours from the original posting of this bulletin for
the KB articles to be visible in the Web-based Knowledge Base.)

Obtaining Support on this Issue
===============================
If you require technical assistance with this issue, please contact
Microsoft Technical Support. For information on contacting Microsoft
Technical Support, please see
http://support.microsoft.com/support/contact/default.asp.

Revisions
=========
- March 26, 1999: Bulletin Created


For additional security-related information about Microsoft
products, please visit http://www.microsoft.com/security.


---------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.

(c) 1999 Microsoft Corporation. All rights reserved. Terms of Use.

*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.

For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/security/bulletin.htm. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close