what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

asb00-08.iis.escaped

asb00-08.iis.escaped
Posted Jul 1, 2000
Site allaire.com

Allaire Security Bulletin (ASB00-08) - Microsoft has announced a Microsoft has released a patch for a security vulnerability in Microsoft(r) Internet Information Server. The vulnerability could allow a malicious user to slow a web server's response or prevent it from providing service altogether for a period of time. This is not a problem with ColdFusion Server itself, but it is an issue that can affect ColdFusion users. Allaire recommends that customers follow the instructions posted on the Microsoft Web site to address this issue.

tags | web
SHA-256 | ac68120bd491e52080e26865af69543e2ae53539643caf20528904d3ab4b9ff1

asb00-08.iis.escaped

Change Mirror Download
Allaire Security Bulletin (ASB00-08)
Microsoft Internet Information Server Patch Available for "Myriad Escaped Characters"
Vulnerability

Originally Posted: April 24, 2000
Last Updated: April 24, 2000

Summary
Microsoft has announced a Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Internet Information Server. The vulnerability could allow a malicious
user to slow a web server's response or prevent it from providing service altogether for a
period of time. This is not a problem with ColdFusion Server itself, but it is an issue that can
affect ColdFusion users. Allaire recommends that customers follow the instructions posted on
the Microsoft Web site to address this issue.

Issue
This issue is clearly explained in the Microsoft Security Bulletin: "Special characters can be
embedded in URLs by use of so-called escaped character sequences. By providing a
specially-malformed URL with an extremely large number of escaped characters, a malicious
user could arbitrarily increase the work factor associated with parsing the escaped characters,
thereby consuming much or all of the CPU availability on the server and preventing useful work
from being done."

Further: "The vulnerability does not provide any capability to cause the server to fail, or to add,
change or delete data on it. The slowdown would only last until the URL had been processed, at
which point service would return to normal."

Affected Software Versions

Any ColdFusion Server running on Microsoft Windows NT Server 4.0 or Microsoft
Windows 2000

What Allaire is Doing
This is not an Allaire product. We are recommending that customers reference the information
at Microsoft's site to address this issue.


What Customers Should Do
There is a patch available to correct this problem. It is detailed in the following Microsoft
Security Bulletin (MS00-023):

http://www.microsoft.com/technet/security/bulletin/ms00-023.asp

Please note: this issue and patch may not be required for all IIS users. Allaire customers
should review all material in the Microsoft Security Bulletin and related documents
carefully before applying the patch. As always, customers should test patch changes in
a testing environment before modifying production servers.

Revisions
April 24, 2000 -- Bulletin first created.

Reporting Security Issues
Allaire is committed to addressing security issues and providing customers with the information
on how they can protect themselves. If you identify what you believe may be a security issue
with an Allaire product, please send an email to secure@allaire.com. We will work to
appropriately address and communicate the issue.

Receiving Security Bulletins
When Allaire becomes aware of a security issue that we believe significantly affects our products
or customers, we will notify customers when appropriate. Typically this notification will be in the
form of a security bulletin explaining the issue and the response. Allaire customers who would
like to receive notification of new security bulletins when they are released can sign up for our
security notification service.

For additional information on security issues at Allaire, please visit the Security Zone at:
http://www.allaire.com/security

THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF
ANY KIND. ALLAIRE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL
ALLAIRE CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING
DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF ALLAIRE CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close