Skip to main content

IIS buffer-overrun attack has been scripted by 'HighSpeed Junkie' from Japan

posted onJuly 6, 2001
by hitbsecnews

A Japanese computer enthusiast named 'HighSpeed Junkie' has developed an attack script for a recently-identified unchecked buffer in the Microsoft IIS (Internet Information Services) Indexing Service ISAPI filter, which, if exploited, can yield system-level access to an intruder.

At issue is IDQ.DLL, a component of Index Server (or 'Indexing Service' in W2K) which supports administrative scripts (.IDA files) and Internet Data Queries (.IDQ files). The library is installed by default on all IIS versions and implementations..

The service need not be running for an attacker to exploit the vulnerability. So long as
script mapping for .IDQ or .IDA files is present and an attacker can establish a Web
session, the exploit will work.

The vulnerability was first reported by eEye Security on
18 June. The attack script was released on 21 June, and posted to the Win2KSecAdvice
mailing list on 27 June.

Patches are available for NT and 2K, except for W2K Datacenter Server, whose users need to
bug their OEMs. The hole will be bunged in Win-XP before it and its Raw Socket Terror are
unleashed upon the public. ®

Related Links
The
relevant MS security bulletin

The
Win-NT 4.0 patch

The
Win-2K Pro and Advanced Server patch

Source

Tags

Networking

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th