CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Microsoft Windows 2000 IIS 5.0 IPP ISAPI 'Host:' Buffer Overflow Vulne...

2016年9月27日 1133点热度 0人点赞 0条评论

漏洞类别:Web server漏洞等级:

漏洞信息

Web printing is activated! If you have already applied the appropriate patches to Microsoft IIS, then you can safely ignore this vulnerability.

Internet Printing Protocol (IPP) enables remote users to submit various print related jobs over the Internet via the HTTP protocol (.print). An unchecked buffer exists in the Internet printing ISAPI extension in Windows 2000 that handles user requests (C:\WINNT\System32\msw3prt.dll). IPP is dependant on msw3prt.dll for functionality.

A host running Windows 2000 with IIS Version 5.0 is susceptible to the execution of arbitrary code via an unchecked buffer in msw3prt.dll. If an HTTP .print request containing approximately 420 bytes in the 'Host:' field is sent to the target, then IIS will experience a buffer overflow and allow the execution of arbitrary code.

Unfortunately, the Internet printing ISAPI extension runs in the LOCAL SYSTEM context; therefore, an unauthorized remote user can specify arbitrary code to be run at SYSTEM privileges.

漏洞危害

Typically, a Web server would stop responding in a buffer overflow condition; however, once Windows 2000 detects an unresponsive Web server, it automatically performs a restart. Therefore, the administrator will not be aware of this attack.

Successful exploitation of this vulnerability could lead to a complete compromise of the target host.

解决方案

Patch:
Following are links for downloading patches to fix the vulnerabilities:

MS01-023: Microsoft Windows 2000 Professional, Windows 2000 Server and Windows 2000 Advanced Server

Virtual Patches:
Trend Micro Virtual Patching
Virtual Patch #1000389: Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
Virtual Patch #1000611: IIS 5.0 Printer Buffer Overflow (MSF)

漏洞类别:Web server漏洞等级:

漏洞信息

Web printing is activated! If you have already applied the appropriate patches to Microsoft IIS, then you can safely ignore this vulnerability.

Internet Printing Protocol (IPP) enables remote users to submit various print related jobs over the Internet via the HTTP protocol (.print). An unchecked buffer exists in the Internet printing ISAPI extension in Windows 2000 that handles user requests (C:\WINNT\System32\msw3prt.dll). IPP is dependant on msw3prt.dll for functionality.

A host running Windows 2000 with IIS Version 5.0 is susceptible to the execution of arbitrary code via an unchecked buffer in msw3prt.dll. If an HTTP .print request containing approximately 420 bytes in the 'Host:' field is sent to the target, then IIS will experience a buffer overflow and allow the execution of arbitrary code.

Unfortunately, the Internet printing ISAPI extension runs in the LOCAL SYSTEM context; therefore, an unauthorized remote user can specify arbitrary code to be run at SYSTEM privileges.

漏洞危害

Typically, a Web server would stop responding in a buffer overflow condition; however, once Windows 2000 detects an unresponsive Web server, it automatically performs a restart. Therefore, the administrator will not be aware of this attack.

Successful exploitation of this vulnerability could lead to a complete compromise of the target host.

解决方案

Patch:
Following are links for downloading patches to fix the vulnerabilities:

MS01-023: Microsoft Windows 2000 Professional, Windows 2000 Server and Windows 2000 Advanced Server

Virtual Patches:
Trend Micro Virtual Patching
Virtual Patch #1000389: Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
Virtual Patch #1000611: IIS 5.0 Printer Buffer Overflow (MSF)

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me