Datamation content and product recommendations are
editorially independent. We may make money when you click on links
to our partners.
Learn More
Microsoft late Wednesday issued patches for three
security holes affecting its Point-to-Point Tunneling Protocol (PPTP),
Windows 2000 platform and versions of the Internet Information Server (IIS).
The Redmond, Wash.-based software giant warned that the most critical of the three
bugs was an unchecked buffer in PPTP implementation that could
enable denial-of-service (DoS) attacks.
Two other security alerts, which bring the total announced by Microsoft this
year to 64, cover fixes for the default permissions in Windows 2000 that
could allow Trojan Horse program execution and a cumulative patch that plugs
four house in IIS versions 4.0, 5.0 or 5.1.
PPTP Implementation
In its advisory warning of an unchecked buffer in
the PPTP implementation, Microsoft said the “critical” vulnerability could
lead to denial-of-service attacks against customers using Windows 2000 or
Windows XP.
“Administrators offering PPTP services should install the patch immediately;
users who utilize remote access using PPTP should consider installing the
patch,” Microsoft warned. (Download patch locations: Windows
2000; Windows
XP 32-bit and Windows
XP 64-bit.
Microsoft said the unchecked buffer was detected in a section of code that
processes the control data used to establish, maintain and tear down PPTP
connections. “By delivering specially malformed PPTP control data to an
affected server, an attacker could corrupt kernel memory and cause the
system to fail, disrupting any work in progress on the system,” the company said.
Windows 2000 and Windows XP support the Point-to-Point Tunneling Protocol
(PPTP), a Virtual Private Networking (VPN) technology that is implemented as
part of Remote Access Services (RAS). The protocol was developed jointly by
Microsoft, U.S. Robotics, and several remote access vendor companies (known
collectively as the PPTP Forum).
Microsoft warned that the vulnerability could be exploited against any
server that offers PPTP. If a workstation had been configured to operate as
a RAS server offering PPTP services, it could likewise be attacked,
according to the advisory. “Workstations acting as PPTP clients could only
be attacked during active PPTP sessions. Normal operation on any attacked
system could be restored by restarting the system,” it said.
Because of how the overrun occurs, Microsoft said it could not find any
reliable means of using it to gain control over a system. “Servers would
only be at risk from the vulnerability if they had been specifically
configured to offer PPTP services. PPTP does not run by default on any
Windows system. Likewise, although it is possible to configure a workstation
to offer PPTP services, none operate in this capacity by default.
Cumulative Patch for IIS
The 62nd security alert from Redmond came in the
form of a cumulative patch to squash four bugs in IIS versions 4.0, 5.0 or
5.1, the most serious of which could enable applications on a server to gain
system-level privileges.
The patch for Microsoft’s Internet Information Server which runs on the company’s NT platforms includes the functionality of all
security patches released for IIS 4.0 since Windows NT 4.0 Service Pack 6a,
and all security patches released to date for IIS 5.0 and 5.1, the company said.
In addition to including previously released fixes, the cumulative patch
also includes fixes for a privilege elevation vulnerability affecting the
way ISAPIs are launched when an IIS 4.0, 5.0 or 5.1 server is configured to
run them out of process.
By design, Microsoft said the hosting process (dllhost.exe) should run only
in the security context of the IWAM_computername account; however, it
can actually be made to acquire LocalSystem privileges under certain
circumstances, thereby enabling an ISAPI to do likewise.
Also patched is a new denial-of-service vulnerability that results because
of a flaw in the way IIS 5.0 and 5.1 allocate memory for WebDAV requests. If
a WebDAV request were malformed in a particular way, the advisory said IIS
would allocate an extremely large amount of memory on the server. By sending
several such requests, an attacker could cause the server to fail.
A vulnerability (also newly discovered) involves the operation of the script
source access permission in IIS 5.0 that operates in addition to the normal
read/write permissions for a virtual directory, and regulates whether
scripts, .ASP files and executable file types can be uploaded to a
write-enabled virtual directory.
Microsoft said a typo error in the table that defines the file types subject
to this permission has the effect of omitting .COM files from the list of
files subject to the permission. As a result, a user would need only ‘write
access’ to upload such a file.
A separate alert warned system administrators
running Windows 2000 of a bug in the default permissions that could allow
the execution of Trojan Horse programs.
This bug, which was discovered by Security Focus, has a “moderate”
rating and there is no patch. Instead, Microsoft recommends that
administrators change the access permissions on the Windows 2000 system root
directory.
It said the problem lies in the default permissions that provide the
Everyone group with Full access (Everyone:F) on the system root folder
(typically, C:). In most cases, the system root is not in the search path
but, under certain conditions, it can be, causing a scenario that could
enable an attacker to mount a Trojan horse attack against other users of the
same system.
Microsoft said an attacker could create a program in the system root with
the same name as some commonly used program, then wait for another user to
subsequently log onto the system and invoke the program. “The Trojan horse
program would execute with the user’s own privileges, thereby enabling it to
take any action that the user could take,” it warned.
“The systems primarily at risk from this vulnerability would be workstations
that are shared between multiple users, and local terminal server sessions.”
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
-
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
-
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
SEE ALL
ARTICLES