Feeds

Win2K Web Server software brown alert goes out

This time it's serious

  • alert
  • submit to reddit

The essential guide to IT transformation

An unchecked buffer in a Windows component could cause web server compromise, Microsoft warns today.

According to Microsoft, the flaw affects Windows 2000 only (i.e. not XP or NT). It revolves around Microsoft's flawed implementation of the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol in IIS. WebDAV is a set of extensions to the Hyper Text Transfer Protocol (HTTP) which provides a standard for editing and file management between computers on the Internet.

On vulnerable Windows 2000 boxes running IIS, the vulnerability can have dire consequences.

"An attacker could exploit the vulnerability by sending a specially formed HTTP request to a machine running Internet Information Server (IIS)," Microsoft's advisory warns. "The request could cause the server to fail or to execute code of the attacker's choice. The code would run in the security context of the IIS service (which, by default, runs in the LocalSystem context)."

Microsoft describes the vulnerability as critical and has released a patch along with advice on workarounds for customers who are not immediately able to apply the fix.

The vulnerability is reminiscent of the flaw which was infamously exploited by the Code Red and Nimda worms.

Microsoft is clearly taking the problem seriously.

Stuart Okin, chief security officer of Microsoft UK, phoned us gives us a heads up on the patch - a first, in our experience. We understand he has spent the day notifying Microsoft's largest UK customers of the problem.

Security tools firm ISS has published an advisory which explains the vulnerability more clearly than the Redmond advisory. According to ISS, versions of IIS 5.0 on Windows 2000 up to and including Service Pack 3 are vulnerable to the flaw. ®

External Links

Microsoft's advisory
ISS alert

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.