Feeds

IIS bug gives attackers complete server control

Linux and Chrome flaws too

The Power of One eBook: Top reasons to choose HP BladeSystem

A hacker has uncovered a previously unknown bug in Microsoft's Internet Information Services webserver that in some cases gives attackers complete control of vulnerable machines.

Proof-of-concept code published Monday has been confirmed to give remote root access to servers running version 5 of IIS on Windows 2000 with Service Pack 4. And according to Nikolaos Rangos, the hacker who released the exploit, IIS6 is also vulnerable, even when a memory stack mechanism known as cookie protection is enabled.

The vulnerability appears to be triggered only in limited circumstances, specifically when IIS is set to enable the file transfer protocol and there is a writable folder. While that suggests the majority of IIS installations aren't vulnerable, the universe of affected systems is still big enough to give the security conscious pause.

"I have customers who have Windows 2000 servers and I scold them frequently." said Rodney Thayer, CTO of security research firm Secorix. "I think that's pretty bad, because if Microsoft says it's end of life and they're claiming it's not supported, then you shouldn't be running any software that the vendor says is not supported."

According to Microsoft's website here, mainstream support for IIS5 expired in 2005, but extended support remains in effect until July 2010. Support for Windows 2000 SP4 ends "24 months after the next service pack releases or at the end of the product's support lifecycle, whichever comes first," according to this page.

A Microsoft spokeswoman said company researchers are looking in to the report and will issue a public statement when they're finished. There are no reports of any such vulnerabilities being exploited in the wild, she added.

In May, Rangos disclosed another serious bug in IIS that left the popular web server vulnerable to a simple attack that exposed password-protected files and folders. Microsoft has since fixed it.

The claim of a bug in IIS is just one of three security advisories that greeted IT professionals on Monday morning. A separate vulnerability affecting a wide range of Linux kernels allows unprivileged local users to read parts of kernel memory that may contain sensitive information. While problematic, the bug - unlike like a critical NULL pointer dereference flaw published two weeks ago - doesn't directly lead to privilege escalation.

The hole has been plugged in Linux 2.6.31-rc7, but there appears to be no fix in the more stable 2.6.30.x series yet, Jon Oberheide, the security researcher who published Monday's disclosure, told The Register.

A third vulnerability disclosed Monday affects Google's Chrome browser and could be used in some cases by malicious websites to track web users. More about the bug is available here (PDF). ®

This article was updated to reflect the official dates support expires for IIS and Windows 2000.

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.