Vulnerability Note VU#516648

Microsoft Windows 2000/Internet Information Server (IIS) 5.0 Internet Printing Protocol (IPP) ISAPI contains buffer overflow (MS01-023)

Original Release date: 02 May 2001 | Last revised: 25 Jun 2001

Overview

A vulnerability exists in Microsoft IIS 5.0 running on Windows 2000 that allows a remote intruder to run arbitrary code on the victim machine.

Description

Windows 2000 includes support for the Internet Printing Protocol (IPP) via an ISAPI extension. According to Microsoft, this extension is installed by default on all Windows 2000 systems, but is only accesible through IIS 5.0. The IPP ISAPI extension contains a buffer overflow that could be used by an attacker to execute arbitrary code in the Local System security context, essentially giving the attacker compete control of the system. For more information, see MS01-023 and the eEye Digital Security bulletin.

Impact

Remote intruders can execute arbitrary code in the Local System security context.

Solution

Install the patch as described in http://www.microsoft.com/Downloads/Release.asp?ReleaseID=29321

One workaround is to remove the ISAPI Internet Printing extension by following these steps:

  1. Open Internet Services Manager
  2. Right-click the web server and Select "Properties" from the Context menu
  3. Select "Master Properties"
  4. In the WWW service->Edit->HomeDirectory menu, Select "Configuration"
  5. Delete the entry for ".printer"

Systems Affected (Learn More)

No information available. If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This document was written by Shawn V Hernan.

Other Information

  • CVE IDs: CAN-2001-0241
  • CERT Advisory: CA-2001-10
  • Date Public: 01 May 2001
  • Date First Published: 02 May 2001
  • Date Last Updated: 25 Jun 2001
  • Severity Metric: 54.00
  • Document Revision: 13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.