funsec mailing list archives

Microsoft denies that purported IIS vuln is a vulnerability


From: "Larry Seltzer" <larry () larryseltzer com>
Date: Tue, 29 Dec 2009 15:02:22 -0500

http://blogs.technet.com/msrc/archive/2009/12/29/results-of-investigation-into-holiday-iis-claim.aspx (below)

They’re saying that for the scenario to work you have to (mis)configure the server in such a way that it’s inherently 
vulnerable. They have a point.

Larry Seltzer
Contributing Editor, PC Magazine
larry_seltzer () ziffdavis com 
http://blogs.pcmag.com/securitywatch/

Feed: The Microsoft Security Response Center (MSRC)
Posted on: Tuesday, December 29, 2009 2:42 PM
Author: MSRCTEAM
Subject: Results of Investigation into Holiday IIS Claim

We’ve completed our investigation into the claims that came up over the holiday of a possible vulnerability in IIS and 
found that there is no vulnerability in IIS.
What we have seen is that there is an inconsistency in IIS 6 only in how it handles semicolons in URLs. It’s this 
inconsistency that the claims have focused on, saying this enables an attacker to bypass content filtering software to 
upload and execute code on an IIS server.
The key in this is the last point: for the scenario to work, the IIS server must already be configured to allow both 
“write” and “execute” privileges on the same directory. This is not the default configuration for IIS and is contrary 
to all of our published best practices. Quite simply, an IIS server configured in this manner is inherently vulnerable 
to attack.
However, customers who are using IIS 6.0 in the default configuration or following our recommended best practices don’t 
need to worry about this issue. If, however, you are running IIS in a configuration that allows both “write” and 
“execute” privileges on the same directory like this scenario requires, you should review our best practices and make 
changes to better secure your system from the threats that configuration can enable. Once again, here’s a list of best 
practices resources:
•         IIS 6.0 Security Best Practices 
•         Securing Sites with Web Site Permissions 
•         IIS 6.0 Operations Guide 
•         Improving Web Application Security: Threats and Countermeasures 
The IIS folks are evaluating a change to bring the behavior of IIS 6.0 in line with the other versions.  In the 
meantime, they’ve put more information up about this on their weblog.
I hope this helps answer any questions. 
Happy Holidays and Happy New Year.
Christopher
*This posting is provided "AS IS" with no warranties, and confers no rights*



_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Current thread: