exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ms01-045

ms01-045
Posted Aug 19, 2001

Microsoft Security Advisory MS01-045 - Three vulnerabilities have been found in ISA Server 2000. H.323 Gatekeeper Service has a memory leak, The Proxy service has a memory leak, and a cross site scripting bug can be exploited on the error page. Microsoft FAQ on this issue available here.

tags | vulnerability, xss, memory leak
SHA-256 | f383753a52efc4f4f537ff17eba9ff7e73873cfb9e768340af3d7c92518ebf61

ms01-045

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title: ISA Server H.323 Gatekeeper Service Contains Memory Leak
Date: 16 August 2001
Software: ISA Server 2000
Impact: Denial of service, cross-site scripting
Bulletin: MS01-045

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-045.asp.
- ----------------------------------------------------------------------

Issue:
======
This bulletin discusses three security vulnerabilities that are
unrelated except in the sense that both affect ISA Server 2000:

- A denial of service vulnerability involving the H.323 Gatekeeper
Service, a service that supports the transmission of voice-over-IP
traffic through the firewall. The service contains a memory leak
that is triggered by a particular type of malformed H.323 data.
Each time such data is received, the memory available on the
server is depleted by a small amount; if an attacker repeatedly
sent such data, the performance of the server could deteriorate to
the point where it would effectively disrupt all communications
across the firewall. A server administrator could restore normal
service by cycling the H.323 service.
- A denial of service vulnerability in the in the Proxy service.
Like the vulnerability above, this one is caused by a memory leak,
and could be used to degrade the performance of the server to
the point where is disrupted communcations.
- A cross-site scripting vulnerability affecting the error page
that ISA Server 2000 generates in response to a failed request
for a web page. An attacker could exploit the vulnerability by
tricking a user into submitting to ISA Server 2000 an URL that
has the following characteristics: (a) it references a valid
web site; (b)it requests a page within that site that can't be
retrieved - that is, a non-existent page or one that generates
an error; and (c) it contains script within the URL. The error
page generated by ISA Server 2000 would contain the embedded
script commands, which would execute when the page was displayed
in the user's browser. The script would run in the security domain
of the web site referenced in the URL, and would be able to access
any cookies that site has written to the user's machine.

Mitigating Factors:
====================
H.323 Denial of service vulnerability:
- The vulnerability could only be exploited if the H.323 Gatekeeper
Service was installed. It is only installed by default if "Full
Installation" is chosen; if "Typical Installation" is selected,
it is not installed.
- The vulnerability would not enable an attacker to gain any
privileges on an affected server or add any traffic to an existing
voice-over-IP session. It is strictly a denial of service
vulnerability.

Proxy Service Denial of service vulnerability:
- The vulnerability could only be exploited by an internal user; it
could not be exploited by an Internet user.
- The vulnerability would not enable an attacker to gain any
privileges on an affected server or compromise any cached content
on the server. It is strictly a denial of service vulnerability.

Cross-site scripting vulnerability:
- In order to run script in the security domain of a trusted site,
the attacker would need to know which sites, if any, a user
trusted. Most users use the default security settings for all web
sites, which would effectively deny an attacker any gain in
exploiting the vulnerability for the purposes of running script.
- An attacker who wished to read other sites' cookies on a user's
machine would have no way to know which sites had placed cookies
there. The attacker would need to exploit the vulnerability once
for every web site whose cookies she wished to access.
- Even if the attacker correctly guessed which sites had placed
cookies on a user's machine, there should be no sensitive
information in the cookies, if best practices have been followed.

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin
http://www.microsoft.com/technet/security/bulletin/ms01-045.asp
for information on obtaining this patch.

Acknowledgment:
===============
- Peter Grundl for reporting the memory leaks in the H.323
Gatekeeper Service and the Proxy Service.
- Dr. Hiromitsu Takagi for reporting the cross-site scripting
vulnerability.

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.



-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBO3w1N40ZSRQxA/UrAQGRTAf/f+CsYKPRvC/a/AlMO6gUVCOP3MA9zvtU
hKQBFvmNsAho2TFXgk/uYeoQ1ACRJQ3rXLrciaYnyPpdofZUT2dgoehWCEwWCIw4
Bjw9A0lplVgOQCMFDuMciKISjgaBfNG8wpj9tEwBLRqZ2O0CgF5D6kQgOcrOryg/
eDc4sQWX6S6oGVPvMgsRCVLu4yOUiO589Vaf63P44h47Z5b4T0TqVOKcB2PDBtjq
v03Cq+7pApbD9hOD6lUUd9DHF1kWVVcO4HoufdH1rkCyHrG70ZclpHt3qK+jFdJP
fPPThkAmtQpppwBhXN46Tvk8/N7lhIVScTTGCFuOh0SEIkpQWffNkA==
=kH78
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close