exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ms02-053

ms02-053
Posted Sep 26, 2002
Site microsoft.com

Microsoft Security Advisory MS02-053 - Serious vulnerabilities have been discovered in Microsoft FrontPage Server Extensions 2000 and 2002 in the SmartHTML Interpreter (shtml.dll). FrontPage Server Extensions 2002 the flaw allows remote attackers to run code of his choice; on FrontPage Server Extensions 2000 the attacker can consume most or all available CPU until the service is restarted.

tags | remote, vulnerability
SHA-256 | e336209cb8e7287fcc28062f2faba13182a7f5785256bb71bd5aa1e1aeb6918f

ms02-053

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title: Buffer Overrun in SmartHTML Interpreter Could Allow
Code Execution (Q324096)
Released: 25 September 2002
Software: FrontPage Server Extensions 2000 and 2002
Impact: Denial of service or privilege elevation
Max Risk: Critical
Bulletin: MS02-053

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-053.asp.
- ----------------------------------------------------------------------

Issue:
======
The SmartHTML Interpreter (shtml.dll) is part of the FrontPage
Server Extensions (FPSE), and provides support for web forms and
other FrontPage-based dynamic content. The interpreter contains a
flaw that could be exposed when processing a request for a particular
type of web file, if the request had certain specific character-
istics. This flaw affects the two versions of FrontPage Server
Extensions differently. On FrontPage Server Extensions 2000, such
a request would cause the interpreter to consume most or all CPU
availability until the web service was restarted. An attacker could
use this vulnerability to conduct a denial of service attack against
an affected web server. On FrontPage Server Extensions 2002, the
same type of request could cause a buffer overrun, potentially
allowing an attacker to run code of his choice.

Mitigating Factors:
====================
- - The IIS Lockdown Tool, if used to configure a static web server,
disables the SmartHTML Interpreter. Servers on which this has
been done could not be affected by the vulnerability.
- - FrontPage Server Extensions install on IIS 4.0, 5.0 and 5.1 by
default, but can be uninstalled if desired. Servers on which
this has been done could not be affected by the vulnerability.

Risk Rating:
============
- Internet systems: Critical
- Intranet systems: Moderate
- Client systems: None

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms02-053.asp
for information on obtaining this patch.

Acknowledgment:
===============
Microsoft thanks Maninder Bharadwaj (digital.defense@digital.com)
of Digital GlobalSoft Ltd. for reporting this issue to us and
working with us to protect customers.


- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN
IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.


-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPZIL7I0ZSRQxA/UrAQGtfAf+KSEvzAlpFAGH26KCQCu7wmZU2mt2rXn6
+D0aSoALY3qkZow+vdJIkNBDa9QdfuhbYmB93h/Ir+LeNfYbX+D+9/NNvwXZl3kI
bGZtwi0BGXVCyA3m9yZBoig+AZuVCpHJiO3Hfv8eauyWHn/3hdWrVmlFUr/YDXuV
56+Wkoy2XD2GcT9N8I2EbCeHiPe790meHM+anzwog14YcB3lXWM2UaU+qP0bwg/a
h0W0CqVmZAD1132TuRFaebWjrwQIuTpa93SqbMQYSNerMfNpzZPCjnnL2kXj4ioH
7cN80bl439JNyvR/vzvBa+xpsZmj70iP0baVrCK0zoNkYZG80LWuZg==
=wPUR
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close