Feeds

IIS über-patch claims to wipe out all old Web server flaws

And five fresh bugs too

  • alert
  • submit to reddit

The essential guide to IT transformation

Microsoft has released an über-patch that aims to address all the previously announced vulnerabilities in its IIS Web server software, and a few more besides.

The cumulative patch includes the functionality of all security patches released to date for IIS 5.0, and all patches released for IIS 4.0 since Windows NT 4.0 Service Pack 5.

Microsoft has promised that the cumulative patch eliminates the "side effects" of the previous IIS cumulative patch, which have led some admins to defer the installation of the fix even while the FBI warned the Russian Mafia was exploiting flaws with IIS to raid online banks.

Apparently it took the outbreak of Code Red for Microsoft to take anything approaching decisive in making its easier for admins to guard against the many flaws on IIS.

The update, which amounts to a point release for both IIS 4 and IIS 5, also addresses five previously undisclosed vulnerabilities with IIS, which could result in either denial of service or privilege elevation.

  • A denial of service flaw that could enable an attacker to cause the IIS 4.0 service to fail, if URL redirection has been enabled. The Code Red worm generates traffic that can in some cases exploit this flaw even on boxes that weren't susceptible to infection by the worm.
  • A flaw with the WebDAV feature of IIS 5.0 that could temporarily disrupt services.
  • Yet another DoS bug that revolves around the IIS 5.0 interprets content containing a particular type of invalid MIME header.
  • A buffer overrun vulnerability involving the code that performs server-side include (SSI) directives. An attacker who had the ability to place content onto a server could include a malformed SSI directive that would crash a system and insert potentially malicious code into the system, where it might subsequently be executed.
  • A privilege elevation vulnerability involving the processing tables used by IIS 5.0.

That's quite a list and it makes you wonder what other bugs the notoriously flaky IIS harbours.

When Microsoft next releases a Web server product we hope it sees the value of a comprehensive security audit BEFORE the product is released. We can but hope... ®

External Links

MS bulletin: cumulative patch for IIS

Related Stories

MS internal network whacked by Code Red
Russian Mafia uses NT flaws to raid Internet banks
Code Red and the Cisco side effect
Son of Code Red is born
Internet survives Code Red
IIS worm made to packet Whitehouse.gov
MS hacked once, twice, three, FOUR times
MS confronts another IIS system-level hole
Yet another IIS exploit reported
Microsoft IIS hole gives System-level access

Next gen security for virtualised datacentres

More from The Register

next story
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.