檔案過大!部分文章無法顯示
標題: Code Red 病毒 (欣蔚必看)
時間: Fri Aug 3 01:58:44 2001
TW-CA-2001-084-[CA-2001-13 Buffer Overflow In IIS Indexing Service DLL]
- - - - - - ------------------------------------------------------------
TWCERT發布日期: 2001/06/21
原漏洞發布日期 : 2001/06/19
分類 : CERT/CC
來源參考 : CERT Advisory (CA-2001-13)
------ 影響系統 --------------------------------------------------------
使用IIS 4.0或是IIS 5.0的Microsoft Windows NT 4.0
Microsoft Windows 2000(Professional, Server, Advanced Server,
Datacenter Server)
Microsoft Windows XP beta
------ 簡述 ------------------------------------------------------------
Windows NT, Windows 2000, 以及Windows XP beta版本中的Microsoft IIS 4.0
以及5.0上的Indexing Services存在著一漏洞,這個漏洞允許遠端的攻擊者在被攻
擊者的電腦上執行任意程式。關於如何利用這個漏洞來進行攻擊的技術文章已經在
網路上被廣為流傳,系統管理者應該立刻針對有漏洞的系統進行修正的動作。
------ 說明 ------------------------------------------------------------
現在已經有一個可以遠端針對IIS 4.0以及5.0中所安裝的ISAPI進行緩衝溢位攻擊
的攻擊程式,針對這個漏洞的入侵攻擊程式可以在被認為安全的區域系統執行任意
的程式,進而讓攻擊者可以在被攻擊者的電腦上取得完整的控制權。
這個漏洞是由eEye Digital Security所發現的,微軟也在他們的安全通報提及了此
一漏洞的相關資訊:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp.
受到影響的Windows系統包括有Windows NT 4.0(安裝IIS 4.0以及Index Server 2.0),
Windows 2000(安裝IIS 5.0的Server以及Professional版本),以及Windows 2000
Datacenter Server OEM版本;然而在預設狀況下,並不是所有以上的系統都是有漏洞
的,在預設值的狀況下Windows XP beta版是有此一漏洞的。要能夠發動此一漏洞攻擊
程式的唯一先決條件是IIS伺服器執行Internet Data Administration (.ida)以及
Internet Data Query (.idq)檔案程式,而這些程式卻是Indexing伺服器並不需要去
執行的程式。
節錄微軟MS01-033:
在任何indexing功能被執行之前緩衝區溢位就已經發生。
雖然idq.dll是Index Server/Indexing Service中的元件,但是Index伺服器卻不需
要執行這個可以被利用來進行攻擊的元件,只要有.idq或是.ida檔案的
script mapping,攻擊者就可以建立一個web session,進而針對漏洞進行攻擊。這個
漏洞已經被Common Vulnerabilities and Exposures(CVE)給予一個漏洞編號
CAN-2001-0500:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0500
----- 修正方式 --------------------------------------------------------
-- 安裝修正檔
可以在以下微軟網址取得修正檔
Windows NT 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833
Windows 2000 Professional, Server, and Advanced Server:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800
這些修正檔可以取代先前在微軟安全通報MS01-025以及MS00-006中所提供的檔案。
使用Windows 2000 Datacenter Server的使用者必須向他們的OEM廠商要求修正檔。
以下提供了OEM廠商的列表以供查詢:
http://www.microsoft.com/windows2000/datacenter/howtobuy/purchasing/oems.asp
-- 替代方案
使用Windows XP beta版本的使用者盡可能的在新版XP公佈的時候進行系統更新。
所有受漏洞影響的IIS/Indexing伺服器可以使用移除
Internet Data Administration (.ida)
以及Internet Data Query (.idq) script mapping來確保不會被攻擊程式入侵,
然而這些mapping也有可能會在您安裝其他的軟體元件的時候被重新安裝。
注意:
此問題其他的相關參考資訊請連結以下列示相關網站及詳見文後所附原文。
----- 連絡 TW-CERT ----------------------------------------------------
電話 : 886-7-5250211 傳真 : 886-7-5250212
Email : twcert@cert.org.tw
URL : http://www.cert.org.tw/
PGP key : http://www.cert.org.tw/eng/pgp.htm
----- 附件 ------------------------------------------------------------
附件:[CA-2001-13 Buffer Overflow In IIS Indexing Service DLL]
CERTR Advisory CA-2001-13 Buffer Overflow In IIS Indexing Service DLL
Original release date: June 19, 2001
Last revised: --
Source: CERT/CC
A complete revision history is at the end of this file.
Systems Affected
- -Systems running Microsoft Windows NT 4.0 with IIS 4.0 or IIS 5.0 enabled
- -Systems running Microsoft Windows 2000 (Professional, Server,
Advanced Server,Datacenter Server)
- -Systems running beta versions of Microsoft Windows XP
Overview
A vulnerability exists in the Indexing Services used by Microsoft IIS
4.0 and IIS 5.0 running on Windows NT, Windows 2000, and beta versions
of Windows XP.
This vulnerability allows a remote intruder to run arbitrary code on
the victim machine.
Since specific technical details on how to create an exploit are publicly
available for \
this vulnerability, system administrators should apply fixes or
workarounds on affected systems as soon as possible.
I. Description
There is a remotely exploitable buffer overflow in one of the ISAPI
extensions installed with most versions of IIS 4.0 and 5.0
(The specific Internet/Indexing Service Application Programming
Interface extension is IDQ.DLL).
An intruder exploiting this vulnerability may be able to execute
arbitrary code in the Local System security context. This essentially
can give the attacker complete control of the victim system.
This vulnerability was discovered by eEye Digital Security.
Microsoft has released the following bulletin regarding this issue:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
Affected versions of Windows include Windows NT 4.0 (installed with
IIS 4.0 and Index Server 2.0),Windows 2000 (Server and Professional
with IIS 5.0 installed), and Windows 2000 Datacenter Server
OEM distributions; however, not all of these instances are vulnerable
by default.
The beta versions of Windows XP are vulnerable by default.
The only precondition for exploiting this vulnerability is that an IIS
server is running with script mappings for Internet Data Administration
(.ida) and Internet Data Query (.idq) files.
The Indexing Services do not need to be running. As stated by Microsoft
in MS01-033:
The buffer overrun occurs before any indexing functionality is
requested. As a result, even though idq.dll is a component of Index
Server/Indexing Service, the service would not need to be running
in order for an attacker to exploit the vulnerability. As long as
the script mapping for .idq or .ida files were present, and the
attacker were able to establish a web session, he could exploit the
vulnerability.
This vulnerability has been assigned the identifier CAN-2001-0500 by
the Common Vulnerabilities and Exposures (CVE) group:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0500
II. Impact
Anyone who can reach a vulnerable web server can execute arbitrary code
in the Local System security context. This results in the intruder
gaining complete control of the system.
Note that this may be significantly more serious than a simple
"web defacement."
III. Solution
Apply a patch from your vendor
Apply patches for vulnerable Windows NT 4.0 and Windows 2000 systems:
For Windows NT 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833
For Windows 2000 Professional, Server, and Advanced Server:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800
These patches supersede the ones previously provided in Microsoft
Security Bulletins MS01-025 and MS00-006.
Users of Windows 2000 Datacenter Server software should contact their
original equipment manufacturer (OEM) for patches. A list of OEM
providers may be found here:
http://www.microsoft.com/windows2000/datacenter/howtobuy/purchasing/oems.asp
Workarounds
Users of beta copies of Windows XP should upgrade to a newer version
of the software when
it becomes available.
All affected versions of IIS/Indexing Services can be protected against
exploits of this vulnerability by removing script mappings for for Internet
Data Administration (.ida) and Internet Data Query (.idq) files. However,
such mappings may be recreated when installing other related software
components.
Appendix A. Vendor Information
Microsoft Corporation
The following documents regarding this vulnerability are available
from Microsoft:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
http://www.microsoft.com/technet/support/kb.asp?ID=Q300972
References
VU#952336: Microsoft Index Server/Indexing Service used by IIS 4.0/5.0
contains unchecked buffer used when encoding double-byte characters
CERT/CC, 06/19/2001,https://www.kb.cert.org/vuls/id/952336
Additional advice on securing IIS web servers is available from
http://www.microsoft.com/technet/security/iis5chk.asp
http://www.microsoft.com/technet/security/tools.asp
Feedback concerning this document may be directed to Jeffrey S. Havrilla.
- ---------------------------------------------------------------------
This document is available from:http://www.cert.org/advisories/CA-2001-13.html
- ---------------------------------------------------------------------
--
┌┌┌┌ Origin: 小魚的紫色花園 <fpg.twbbs.org> 140.112.200.214 ───┐┐┐┐
TW-CA-2001-084-[CA-2001-13 Buffer Overflow In IIS Indexing Service DLL]
- - - - - - ------------------------------------------------------------
TWCERT發布日期: 2001/06/21
原漏洞發布日期 : 2001/06/19
分類 : CERT/CC
來源參考 : CERT Advisory (CA-2001-13)
------ 影響系統 --------------------------------------------------------
使用IIS 4.0或是IIS 5.0的Microsoft Windows NT 4.0
Microsoft Windows 2000(Professional, Server, Advanced Server,
Datacenter Server)
Microsoft Windows XP beta
------ 簡述 ------------------------------------------------------------
Windows NT, Windows 2000, 以及Windows XP beta版本中的Microsoft IIS 4.0
以及5.0上的Indexing Services存在著一漏洞,這個漏洞允許遠端的攻擊者在被攻
擊者的電腦上執行任意程式。關於如何利用這個漏洞來進行攻擊的技術文章已經在
網路上被廣為流傳,系統管理者應該立刻針對有漏洞的系統進行修正的動作。
------ 說明 ------------------------------------------------------------
現在已經有一個可以遠端針對IIS 4.0以及5.0中所安裝的ISAPI進行緩衝溢位攻擊
的攻擊程式,針對這個漏洞的入侵攻擊程式可以在被認為安全的區域系統執行任意
的程式,進而讓攻擊者可以在被攻擊者的電腦上取得完整的控制權。
這個漏洞是由eEye Digital Security所發現的,微軟也在他們的安全通報提及了此
一漏洞的相關資訊:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp.
受到影響的Windows系統包括有Windows NT 4.0(安裝IIS 4.0以及Index Server 2.0),
Windows 2000(安裝IIS 5.0的Server以及Professional版本),以及Windows 2000
Datacenter Server OEM版本;然而在預設狀況下,並不是所有以上的系統都是有漏洞
的,在預設值的狀況下Windows XP beta版是有此一漏洞的。要能夠發動此一漏洞攻擊
程式的唯一先決條件是IIS伺服器執行Internet Data Administration (.ida)以及
Internet Data Query (.idq)檔案程式,而這些程式卻是Indexing伺服器並不需要去
執行的程式。
節錄微軟MS01-033:
在任何indexing功能被執行之前緩衝區溢位就已經發生。
雖然idq.dll是Index Server/Indexing Service中的元件,但是Index伺服器卻不需
要執行這個可以被利用來進行攻擊的元件,只要有.idq或是.ida檔案的
script mapping,攻擊者就可以建立一個web session,進而針對漏洞進行攻擊。這個
漏洞已經被Common Vulnerabilities and Exposures(CVE)給予一個漏洞編號
CAN-2001-0500:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0500
----- 修正方式 --------------------------------------------------------
-- 安裝修正檔
可以在以下微軟網址取得修正檔
Windows NT 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833
Windows 2000 Professional, Server, and Advanced Server:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800
這些修正檔可以取代先前在微軟安全通報MS01-025以及MS00-006中所提供的檔案。
使用Windows 2000 Datacenter Server的使用者必須向他們的OEM廠商要求修正檔。
以下提供了OEM廠商的列表以供查詢:
http://www.microsoft.com/windows2000/datacenter/howtobuy/purchasing/oems.asp
-- 替代方案
使用Windows XP beta版本的使用者盡可能的在新版XP公佈的時候進行系統更新。
所有受漏洞影響的IIS/Indexing伺服器可以使用移除
Internet Data Administration (.ida)
以及Internet Data Query (.idq) script mapping來確保不會被攻擊程式入侵,
然而這些mapping也有可能會在您安裝其他的軟體元件的時候被重新安裝。
注意:
此問題其他的相關參考資訊請連結以下列示相關網站及詳見文後所附原文。
----- 連絡 TW-CERT ----------------------------------------------------
電話 : 886-7-5250211 傳真 : 886-7-5250212
Email : twcert@cert.org.tw
URL : http://www.cert.org.tw/
PGP key : http://www.cert.org.tw/eng/pgp.htm
----- 附件 ------------------------------------------------------------
附件:[CA-2001-13 Buffer Overflow In IIS Indexing Service DLL]
CERTR Advisory CA-2001-13 Buffer Overflow In IIS Indexing Service DLL
Original release date: June 19, 2001
Last revised: --
Source: CERT/CC
A complete revision history is at the end of this file.
Systems Affected
- -Systems running Microsoft Windows NT 4.0 with IIS 4.0 or IIS 5.0 enabled
- -Systems running Microsoft Windows 2000 (Professional, Server,
Advanced Server,Datacenter Server)
- -Systems running beta versions of Microsoft Windows XP
Overview
A vulnerability exists in the Indexing Services used by Microsoft IIS
4.0 and IIS 5.0 running on Windows NT, Windows 2000, and beta versions
of Windows XP.
This vulnerability allows a remote intruder to run arbitrary code on
the victim machine.
Since specific technical details on how to create an exploit are publicly
available for \
this vulnerability, system administrators should apply fixes or
workarounds on affected systems as soon as possible.
I. Description
There is a remotely exploitable buffer overflow in one of the ISAPI
extensions installed with most versions of IIS 4.0 and 5.0
(The specific Internet/Indexing Service Application Programming
Interface extension is IDQ.DLL).
An intruder exploiting this vulnerability may be able to execute
arbitrary code in the Local System security context. This essentially
can give the attacker complete control of the victim system.
This vulnerability was discovered by eEye Digital Security.
Microsoft has released the following bulletin regarding this issue:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
Affected versions of Windows include Windows NT 4.0 (installed with
IIS 4.0 and Index Server 2.0),Windows 2000 (Server and Professional
with IIS 5.0 installed), and Windows 2000 Datacenter Server
OEM distributions; however, not all of these instances are vulnerable
by default.
The beta versions of Windows XP are vulnerable by default.
The only precondition for exploiting this vulnerability is that an IIS
server is running with script mappings for Internet Data Administration
(.ida) and Internet Data Query (.idq) files.
The Indexing Services do not need to be running. As stated by Microsoft
in MS01-033:
The buffer overrun occurs before any indexing functionality is
requested. As a result, even though idq.dll is a component of Index
Server/Indexing Service, the service would not need to be running
in order for an attacker to exploit the vulnerability. As long as
the script mapping for .idq or .ida files were present, and the
attacker were able to establish a web session, he could exploit the
vulnerability.
This vulnerability has been assigned the identifier CAN-2001-0500 by
the Common Vulnerabilities and Exposures (CVE) group:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0500
II. Impact
Anyone who can reach a vulnerable web server can execute arbitrary code
in the Local System security context. This results in the intruder
gaining complete control of the system.
Note that this may be significantly more serious than a simple
"web defacement."
III. Solution
Apply a patch from your vendor
Apply patches for vulnerable Windows NT 4.0 and Windows 2000 systems:
For Windows NT 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30833
For Windows 2000 Professional, Server, and Advanced Server:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30800
These patches supersede the ones previously provided in Microsoft
Security Bulletins MS01-025 and MS00-006.
Users of Windows 2000 Datacenter Server software should contact their
original equipment manufacturer (OEM) for patches. A list of OEM
providers may be found here:
http://www.microsoft.com/windows2000/datacenter/howtobuy/purchasing/oems.asp
Workarounds
Users of beta copies of Windows XP should upgrade to a newer version
of the software when
it becomes available.
All affected versions of IIS/Indexing Services can be protected against
exploits of this vulnerability by removing script mappings for for Internet
Data Administration (.ida) and Internet Data Query (.idq) files. However,
such mappings may be recreated when installing other related software
components.
Appendix A. Vendor Information
Microsoft Corporation
The following documents regarding this vulnerability are available
from Microsoft:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
http://www.microsoft.com/technet/support/kb.asp?ID=Q300972
References
VU#952336: Microsoft Index Server/Indexing Service used by IIS 4.0/5.0
contains unchecked buffer used when encoding double-byte characters
CERT/CC, 06/19/2001,https://www.kb.cert.org/vuls/id/952336
Additional advice on securing IIS web servers is available from
http://www.microsoft.com/technet/security/iis5chk.asp
http://www.microsoft.com/technet/security/tools.asp
Feedback concerning this document may be directed to Jeffrey S. Havrilla.
- ---------------------------------------------------------------------
This document is available from:http://www.cert.org/advisories/CA-2001-13.html
- ---------------------------------------------------------------------
--
┌┌┌┌ Origin: 小魚的紫色花園 <fpg.twbbs.org> 140.112.200.214 ───┐┐┐┐