what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

sa_08.txt

sa_08.txt
Posted Dec 15, 2000
Site nsfocus.com

NSFOCUS Security Advisory (SA2000-08) - Microsoft IIS for Far East Editions File Disclosure Vulnerability. Submitting a malformed URL with a non-ascii character, a different file can be opened and the contents read. Vulnerable versions include IIS 4.0 (Far East Edition) previous to SP6 and IIS 5.0 (Far East Edition). English versions are unaffected. Exploit will be released soon.

SHA-256 | 18ac62855ee1f46fc88efa8ccb402ebb65f449eb0664a5ce46786c49c83d7b5b

sa_08.txt

Change Mirror Download
NSFOCUS Security Advisory(SA2000-08)

Topic: Microsoft IIS for Far East Editions File Disclosure Vulnerability

Release Date£ºDec 13rd, 2000

CVE Candidate Numbers: CAN-2000-1090

Affected system:
==================

- Microsoft IIS 4.0 for Far East editions ( < SP6 )
- Microsoft IIS 5.0 for Far East editions (Chinese (Traditional and
Simplified), Japanese, and Korean (Hangeul))
Non-affected system:
==================

- Microsoft IIS 4.0 for Far East editions( SP6/SP6a )
- Microsoft IIS 5.0/4.0 other editions

Impact:
=========


NSFOCUS security team has found a security flaw in Microsoft IIS 4.0/5.0
(Far East editions) when responding to a HTTP request containing incomplete
double-byte characters(DBCS). It could lead to exposure of files under Web
directory to a remote attacker.

Description£º
============

Microsoft IIS for Far East editions include Chinese (Traditional and
Simplified), Japanese, and Korean (Hangeul), all of which use
double-byte character set(DBCS). When IIS receives a HTTP request
with non-ASCII character in the file name, it will check if it is a
lead-byte(Lead-byte ranges: 0x81 - 0x9F, 0xE0 - 0xFC). If it is, then
IIS go on checking for a trail-byte. And if a trail-byte is not available,
IIS will simply drop the lead-byte. All this will result in an opening of
a different file.

Submitting a malformed URL, attacker can entrap IIS to call some certain
ISAPI DLL, open some kinds of file that it can not interpret. attacker
may obtain the content of file like plain text file(.asp, .ini, .asa
etc.)or binary system file(.exe) under Web or virtual directory.

This problem has been solved in IIS 4.0 with SP6 before it comes forth
again in IIS 5.0.

Other IIS 4.0/5.0 including English versions are unaffected.


Exploit:
==========

[Proof of concept code will be available soon]

Workaround:
===================

1¡¢Remove unnecessary ISAPI mapping like HTR, HTW,IDQ etc.

2¡¢Turn on "Check that file exists" option in every necessary
ISAPI mapping.

3¡¢If you are using vulnerable IIS 4.0 with prior SP6, update to SP6.

Vendor Status:
==============

Microsoft has been informed on Oct 8, 2000.

Additional Information:
========================

The Common Vulnerabilities and Exposures (CVE) project has
assigned the name CAN-2000-1090 to this issue. This is a
candidate for inclusion in the CVE list (http://cve.mitre.org),
which standardizes names for security problems. Candidates
may change significantly before they become official CVE entries.

DISCLAIMS:
==========
THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT WARRANTY OF ANY
KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, EXCEPT FOR
THE WARRANTIES OF MERCHANTABILITY. IN NO EVENTSHALL NSFOCUS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,CONSEQUENTIAL, LOSS OF
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF NSFOCUS HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. DISTRIBUTION OR REPRODUTION OF THE INFORMATION IS
PROVIDED THAT THE ADVISORY IS NOT MODIFIED IN ANY WAY.

?Copyright 1999-2000 NSFOCUS. All Rights Reserved. Terms of use.


NSFOCUS Security Team <security@nsfocus.com>
NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
(http://www.nsfocus.com)




Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close