what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms00-098

ms00-098
Posted Dec 21, 2000

Microsoft Security Bulletin (MS00-098) - Microsoft has released a patch that eliminates a security vulnerability in Windows 2000 which allows malicious web site operators to learn the names and properties of files and folders on the machine of a visiting user. An ActiveX control that ships as part of Indexing Service is incorrectly marked as safe for scripting, thereby enabling it to be executed by web site applications. Microsoft FAQ on this issue available here.

tags | web, activex
systems | windows
SHA-256 | dea039b3a54461433703185993d68742ed9c4f44655892b6dc44d7ef1927f45b

ms00-098

Change Mirror Download
   Microsoft Security Bulletin (MS00-098)

Patch Available for Indexing Service File Enumeration Vulnerability

Originally posted: December 19, 2000

Summary

Microsoft has released a patch that eliminates a security
vulnerability in a component that ships as part of Microsoft® Windows®
2000. The vulnerability could allow a malicious web site operator to
learn the names and properties of files and folders on the machine of
a visiting user.

Frequently asked questions regarding this vulnerability and the patch
can be found at
https://www.microsoft.com/technet/security/bulletin/fq00-098.asp

Issue

An ActiveX control that ships as part of Indexing Service is
incorrectly marked as safe for scripting, thereby enabling it to be
executed by web site applications. The control at issue here could be
used to enumerate files and folders, and to view their properties. It
would not be necessary for Indexing Service to be running in order for
the vulnerability to be exploited; however, if it were running, the
control also could be used to search for files containing specific
words. The vulnerability could not be used to read files, except via a
fairly unlikely scenario discussed in detail in the FAQ. It could not
be used under any conditions to change, add or delete information on
the users computer.

A patch has been provided for Indexing Service 3.0, but not for Index
Server 2.0. This is primarily due to the different delivery vehicles
for the two versions. Indexing Service 3.0 ships as part of all
versions of Windows 2000; thus, the vulnerability could affect all
Windows 2000 users. In contrast, Index Server 2.0 ships as part of the
Windows NT 4.0 Option Pack; thus, to be affected by the vulnerability
in Index Server 2.0, a webmaster would need to browse untrustworthy
Internet sites from a web server, which is contrary to normal
recommended practices.

Affected Software Versions

* Index Server 2.0
* Indexing Service 3.0

Note: Index Server 2.0 ships as part of the Windows NT 4.0 Option
Pack. Indexing Service 3.0 ships as part of all versions of Windows
2000.

Patch Availability

* Indexing Service 3.0:
https://www.microsoft.com/Downloads/Release.asp?ReleaseID=26595

Note: As discussed in the FAQ, a patch has not been provided for Index
Server 2.0, because this product should only be installed on web
servers, which should never be used for browsing the Internet.

Note: This patch can be applied to systems running Windows 2000 Gold
or Service Pack 1. It will be included in Windows 2000 Service Pack 3.

Note Additional security patches are available at the Microsoft
Download Center

More Information

Please see the following references for more information related to
this issue.
* Frequently Asked Questions: Microsoft Security Bulletin MS00-098,
https://www.microsoft.com/technet/security/bulletin/fq00-098.asp
* Microsoft Knowledge Base article Q280838 discusses this issue and
will be available soon.
* Microsoft TechNet Security web site,
https://www.microsoft.com/technet/security/default.asp

Obtaining Support on this Issue

This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
https://support.microsoft.com/support/contact/default.asp.

Revisions

* December 19, 2000: Bulletin Created.

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS
OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY
NOT APPLY.

Last updated December 19, 2000
© 2000 Microsoft Corporation. All rights reserved. Terms of use.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close