what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CISADV000203.txt

CISADV000203.txt
Posted Feb 4, 2000
Authored by David Litchfield

Cerberus Information Security Advisory - Windows NT systems running Frontpage Server Extentions reveals the name of the anonyous Internet account and leaks physical paths on system.

systems | windows
SHA-256 | a8f1405807d2ae29e4358d0e21c3a9db4d9b8e951dd86aab8ada6504e64ae1b1

CISADV000203.txt

Change Mirror Download
Cerberus Information Security Advisory (CISADV000203)
https://www.cerberus-infosec.co.uk/advisories.html

Released : 3rd February 2000
Name : Frontpage Server Extentions
Affected Systems : Microsoft Windows NT 4 running Internet Information
Server with Frontpage
Issue : Attackers can discover the name of the anonyous
Internet account and learn physical paths on system
Author : David Litchfield (mnemonix@globalnet.co.uk)

Description
*********
The Cerberus Security Team have discovered two issues that may pose a
problem on some sites, though it must be noted that the impact should be
minor provided best practices are followed. It is possible to discover the
name of the account used for allowing anonymous access to the web service
which could be used by an attacker in an attempted brute force attack. Sites
that are going to be most vulnerable to this are those that have changed the
default password assigned to the IUSR_compname account, or those that use
their own defined account, and have not set a suitably strong password. The
second problem will reveal the physical paths of virtual directories, again
a minor issue, but may be of some use to an attacker attempting to break a
system.

Details of account enumeration vulnerability
*********************************
By making a deliberate Vermeer RPC POST request to shtml.dll, located in the
/_vti_bin/ virtual directory, one we know if going to fail due to access
permissions, the server will respond stating that the "IUSR_CHARON" account
is not allowed to run this service - IUSR_CHARON is used here as an example.

Details of physical path discovery vulnerability
***********************************
By making a GET request to htimage.exe found sometimes in the scripts
directory and in the cgi-bin you can map the physical path to the virtual
directory htimage.exe is located in. https://charon/cgi-bin/htimage.exe?2,2
will reveal the physical path as being E:\SITE\cgi\ for example.

Checks for both of these issues have been incorporated into the webscan
module of Cerberus' free vulnerability scanner CIS. If you already have a
version you can download the updated DLL from
https://www.cerberus-infosec.co.uk/webscan.dll . If you don't yet have the
scanner you can get a copy from our website
https://www.cerberus-infosec.co.uk/ - follow the Cerberus Internet Scanner
link.

Solution:
*******
Microsoft has been alerted to these issues and they will address them in the
next version of Frontpage Server Extentions. If you don't use the
functionality provided by Frontpage then you should remove, not only
shtml.dll and htimage.exe but all other files associated with Frontpage. For
those that do use the functionality this should not present too much of a
problem provided you implement a strong password policy - though if this
still is too much of a risk or does not conform to your organization's
security policy then you should consider whether to disable Frontpage or not
until the next version is available.


About Cerberus Information Security, Ltd
********************************
Cerberus Information Security, Ltd, a UK company, are specialists in
penetration testing and other security auditing services. They are the
developers of CIS (Cerberus' Internet security scanner) available for free
from their website: https://www.cerberus-infosec.co.uk

To ensure that the Cerberus Security Team remains one of the strongest
security audit teams available globally they continually research operating
system and popular service software vulnerabilites leading to the discovery
of "world first" issues. This not only keeps the team sharp but also helps
the industry and vendors as a whole ultimately protecting the end consumer.
As testimony to their ability and expertise one just has to look at exactly
how many major vulnerabilities have been discovered by the Cerberus Security
Team - over 40 to date, making them a clear leader of companies offering
such security services.

Founded in late 1999, by Mark and David Litchfield, Cerberus Information
Security, Ltd are located in London, UK but serves customers across the
World. For more information about Cerberus Information Security, Ltd please
visit their website or call on +44(0) 181 661 7405

Permission is hereby granted to copy or redistribute this advisory but only
in its entirety.

Copyright (C) 2000 by Cerberus Information Security, Ltd


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close