what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms01-014

ms01-014
Posted Mar 3, 2001

Microsoft Security Advisory MS01-014 - IIS 5.0 and Exchange 2000 are vulnerable to remote denial of service attacks. If a certain malformed URL is repeatedly sent to an affected system, it will cause a memory allocation error that will result in the failure of the IIS service. Exchange 2000 is affected by the same vulnerability which can crash the Exchange 2000 webmail service. Microsoft FAQ on this issue available here.

tags | remote, denial of service
SHA-256 | 7e7e961b27aafc3eb72e2d0b5a3aebddbe33062cd71ba2ce552a7a2c19f596b4

ms01-014

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title: Malformed URL can cause Service Failure in IIS 5.0 and
Exchange 2000
Date: 01 March 2001
Software: IIS 5.0 and Exchange 2000
Impact: Denial of Service
Bulletin: MS01-014

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-014.asp.
- ----------------------------------------------------------------------

Issue:
======
IIS 5.0 contains a flaw affecting the way that an URL is handled if
it has a specific construction and its length is within a very narrow
range of values. If such an URL were repeatedly sent to an affected
system, a confluence of events could cause a memory allocation error
that would result in the failure of the IIS service.

Exchange 2000 is affected by the same vulnerability. To support
web-based mail clients, it introduces the ability to address items on
the store via URLs. This is done in part by using IIS 5.0, and in
part via code that is specific to Exchange 2000. Both pieces of code
contain the flaw, but the effect of exploiting the vulnerability via
either would be the same -- it could be used to cause the IIS service
to fail, but could not be used to attack the Exchange service itself.
That is, successfully attacking an Exchange server via this
vulnerability would disrupt web-based mail clients' use of the
server, but not that of MAPI-based mail clients like Outlook.

Because the flaw occurs in two different code modules, one of which
installs as part of IIS 5.0 and both of which install as part of
Exchange 2000, it is important for Exchange 2000 administrators to
install both the IIS and Exchange patches.

Mitigating Factors:
====================
- The vulnerability would not enable the attacker to gain any
administrative control over the server, or to alter any data
on it.
- The affected services automatically restart in the event of
a failure, so an affected system would resume service almost
immediately.
- A successful attack against an Exchange server would only
disrupt web-based mail clients' use of the server. The server
would continue to be available for MAPI-based clients like
Outlook.
- The ISAPI involved in this vulnerability authenticates the
user prior to servicing the request, so a properly configured
Exchange server would be at less risk than an IIS server.

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin
http://www.microsoft.com/technet/security/bulletin/ms01-014.asp
for information on obtaining this patch.

Acknowledgment:
===============
- Kevin Kotas of eSecurityOnline.com (http://eSecurityOnline.com)

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.



-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOp7Bvo0ZSRQxA/UrAQF/vQf/VsWFCxqBc0ssPzieJh8pcJWsNyKh32Yf
Q2tcKXp1dwNYAGwfMqa6CBDO3FjFih5c82g5wDoNoPMCUJjsZvGAlZW1wKUqu1+t
tyRltK27FkxjfoLFYC5YCIEvO6qCDU5lxKUoK0IiEmIyqWakSc9PYLSNRwlxXAUH
CJPa2Ad/0Io6hLdFc+jtXxdx/UQofZ8kNycLDiK6IMBmqyYqhX+YrMMqXxYGpJp7
oK1mAvf5mTOtDLmRpzAMbYoFp5a1pYgA89j0e1+4EFBV9lz9aKCk12e9HIw1i8hS
bMXVhIhNtxzQHxnkV5einH3H99o7GUJbNhAuQhzBwIYSHQOrQxNrsQ==
=nphg
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close