NT SECURITY NEWS 8/3/99 |
.HTR Vulnerability in IIS Reported June 8,1999 by eEYE Digital Security Team
DESCRIPTION It's worthy to note that Peer Web Services is also vulnerable to the overflow condition due to the ISM.DLL. In addition to an overflow condition, the IISADMIN interface may be accessed even when the permissions are set to only allow the localhost to connect. Using a URL similar to /scripts/iisadmin/ism.dll?http/dir will present a logon dialog where an intruder can attempt to brute force guess an account name and password.
eEYE released some code that demonstrates the exploit. You'll need to compile the code since it's in assembler format. Here's an executable version of the compiled code -- and here are modified versions of netcat -- one of which runs on port 80, and the other on port 99. And here's some C-based exploit code that runs on UNIX-based systems. In addition, Ryan Permeh published a working PERL-based expliot as follows: #!/usr/bin/perl However, Randal Schwartz points out that it can be done another way: #!/usr/bin/perl Greg Hoglund also wrote some nifty C code that shows how to create a package to deliver a payload into the IIS server.
Microsoft has released a bulletin regarding this matter, and has subsequently issued a fix for IIS to correct the problem. Be sure to read Support Online articles Q234905. You can also modify the properties of your IIS system to minimize the vulnerability. Microsoft highly recommends that customers disable the script mapping for .HTR files as follows: From the desktop, start the Internet Service Manager by clicking Start | Programs | Windows NT 4.0 Option Pack | Microsoft Internet Information Server | Internet Service Manager * Double-click "Internet Information Server"
Discovered by eEYE Digital Security Team Posted here at The NT Shop on June 22, 1999 |