Bugtraq mailing list archives
Remote DoS attack in Internet Information Server 4.0 & 5.0 "Malformed Extension Data in URL" Vulnerability
From: labs () USSRBACK COM (Ussr Labs)
Date: Thu, 11 May 2000 17:33:02 -0300
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Remote DoS attack in Internet Information Server 4.0 & 5.0 "Malformed Extension Data in URL" Vulnerability USSR Advisory Code: USSR-2000040 Release Date: May 11, 2000 Affected Software Versions Microsoft Internet Information Server 4.0 Microsoft Internet Information Server 5.0 THE PROBLEM The Ussr Labs team has recently discovered a memory problem in IIs 4.0 and 5.0. What happens is by preforming an attack with specially-malformed information extension data in The URL, it will cause slow the performance of an affected server, or temporarily stop it altogether. Binary or Source for this D.o.S: http://www.ussrback.com/ SPECIAL NOTE: That we take no responsibility for this code it is for educational purposes only. Vendor Status: Contacted: Saturday, April 15, 2000 7:12 AM Vendor Url: http://www.microsoft.com Program Url: http://www.microsoft.com/ntserver/web/exec/feature/Datasheet.asp (IIS 4.0) Program Url: http://www.microsoft.com/windows2000/guide/server/features/appsvcs.asp (IIS 5.0) Fix: Internet Information Server 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20906 Internet Information Server 5.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20904 More Information: http://www.microsoft.com/technet/security/bulletin/ms00-030.asp Microsoft Security Bulletin MS00-021: Frequently Asked Questions, http://www.microsoft.com/technet/security/bulletin/fq00-030.asp Microsoft Knowledge Base article Q260205 discusses this issue and will be available soon Related Links: Underground Security Systems Research http://www.ussrback.com Greetings: Eeye, Attrition, w00w00, beavuh, Rhino9, SecurityFocus.com, ADM, HNN, Sub, Technotronic and Wiretrip. Copyright (c) 1999-2000 Underground Security Systems Research. Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of Ussr. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please e-mail labs () ussrback com for permission. Disclaimer: The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. Feedback: Please send suggestions, updates, and comments to: Underground Security Systems Research mail:labs () ussrback com http://www.ussrback.com u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h http://www.ussrback.com -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com> iQA/AwUBORsYrq3JcbWNj6DDEQKMywCfXE/ius3XNJy5+K+saANx9pvsKvkAoJdn L7sB3rpWHyr3ecKFmtz5526W =Ih6L -----END PGP SIGNATURE-----
Current thread:
- non-exec stack Tim Newsham (May 06)
- "I don't think I really love you" Michal Zalewski (May 07)
- Re: non-exec stack Casper Dik (May 08)
- Re: non-exec stack Gert Doering (May 09)
- Re: non-exec stack Casper Dik (May 09)
- Re: non-exec stack Nate Eldredge (May 10)
- »Ø¸´: Re: non-exec stac ZhaoQian (May 10)
- Alert: IIS ism.dll exposes file contents Cerberus Security Team (May 11)
- ISSalert: Internet Security Systems Security Advisory: Microsoft IIS Remote Denial of Service Attack Warren Barrow (May 11)
- Remote DoS attack in Internet Information Server 4.0 & 5.0 "Malformed Extension Data in URL" Vulnerability Ussr Labs (May 11)
- Microsoft Security Bulletin (MS00-030) Microsoft Product Security (May 11)
- IE Domain Confusion Vulnerability Foo Bar (May 11)
- Overflow in Outlook Express 4.* - too long filenames with graphic format extension Ultor (May 12)
- Eudora Sensitive to Long Filenames Ron Moritz (May 18)
- IE Domain Confusion Vulnerability is an Email problem also Richard M. Smith (May 12)
- Re: IE Domain Confusion Vulnerability doesn't matter much Marc Slemko (May 12)
- Re: IE Domain Confusion Vulnerability doesn't matter much Richard M. Smith (May 15)
- Vulnerability in CGI counter 4.0.7 by George Burgyan Howard M. Kash III (May 15)
- Vulnerability in EMURL-based e-mail providers Pierre Benoit (May 15)
- Re: non-exec stack Gert Doering (May 09)
- New Solaris root exploit for /usr/lib/lp/bin/netpr Anonymous (May 12)