Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2000.077 -- Microsoft Security Bulletin (MS00-028) Procedure Available to Eliminate "Server-Side Image Map Components" Vulnerability 04 May 2000 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: FrontPage 97 and 98 Server Extensions Vendor: Microsoft Operating System: MS Windows Platform: N/A Impact: Execute Arbitrary Code Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Microsoft Security Bulletin (MS00-028) - - -------------------------------------- Procedure Available to Eliminate "Server-Side Image Map Components" Vulnerability Originally Posted: April 21, 2000 Summary ======= A procedure is available to eliminate a security vulnerability affecting several web server products. The vulnerability could potentially allow a malicious web site visitor to perform actions that the system permissions authorize him to perform, but which he previously may have had no means of actually carrying out. Frequently asked questions regarding this vulnerability and the remediation for it can be found at http://www.microsoft.com/technet/security/bulletin/fq00-028.asp Issue ===== The FrontPage 97 and 98 Server Extensions include two components, Htimage.exe and Imagemap.exe, that provide CERN- and NCSA-compliant server side image mapping support, respectively, for legacy browsers. Both components contain unchecked buffers that could be used to run arbitrary code. Although part of the Server Extensions, these components also install as part of several other web server products. The risk posed by this vulnerability is significantly restricted by the fact that the affected components run "out of process" and in the security context of the user. Thus, there is no capability through this vulnerability to cause either the web service or the server itself to crash, nor is there an opportunity to run code in an elevated security context. However, it still could be possible for a malicious user to perform actions that, though permitted, he would otherwise be unable to take because the functionality was not exposed via a web page or script. Affected Software Versions ========================== The affected components are part of the FrontPage 97 and 98 Server Extensions. However, they also are distributed with several other web server products. The complete list of products in which these components ship is: - FrontPage 97 Server Extensions, which ship as part of FrontPage 97 - FrontPage 98 Server Extensions, which ship as part of FrontPage 98 - Microsoft(r) Windows NT(r) 4.0 Option Pack, which is the primary distribution mechanism for Internet Information Server 4.0 - Personal Web Server 4.0, which ships as part of Windows(r) 95 and 98 Remediation =========== To eliminate this vulnerability, customers who are hosting web sites using any of the affected products should delete all copies of the files Htimage.exe and Imagemap.exe from their servers. The FAQ provides step-by-step instructions for doing this. The only functionality lost by deleting the file is the ability to support image mapping for web site visitors using legacy browser products. ISPs and other customers who allow others to self-manage web sites should be aware that users who use FrontPage 97 or 98 to manage their sites could unknowingly re-introduce the affected components onto their sites when they upload content to it. This would not endanger the server at large, but could nevertheless be cause for concern. The FAQ discusses how to use functionality provided as part of the Server Extensions to prevent this from happening. More Information ================ Please see the following references for more information related to this issue. - Frequently Asked Questions: Microsoft Security Bulletin MS00-028, http://www.microsoft.com/technet/security/bulletin/fq00-028.asp - Microsoft Knowledge Base article Q260267 discusses this issue and will be available soon. - Microsoft TechNet Security web site, http://www.microsoft.com/technet/security/default.asp Obtaining Support on this Issue =============================== Information on contacting Microsoft Technical Support is available at http://support.microsoft.com/support/contact/default.asp. Revisions ========= - April 21, 2000: Bulletin Created. - - ---------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. Last updated April 21, 2000 (c) 2000 Microsoft Corporation. All rights reserved. Terms of use. - -----BEGIN PGP SIGNATURE----- Version: PGP 6.0.2 iQEVAwUBOQDQkI0ZSRQxA/UrAQEKcgf9Ejn3jVZISZYVY774xgsZZlyT/t0XIlX9 PPR0PRc0wHlis2vub/dmAILchL5Pf4cUnveDvJbkySrz5TlX6zIDEPbGROWpYO7f /BAgKFhQJ0oBdkOyWsrV73l9C5cVN8znboBp83hnmO0q4cbQB+AXcbIIuLTzKzpa 0EGD9/b2ENqnWF1OAQ6sE7fdBJM0Qlp+/Gh5b+FUQRUlYs/jQDXx6rpdM8J3Qeyx 2pHJLcJ0BAB0G0UgZSxfKRqieXgrYbZxHa7Z63osJ3nwiZkpaLBXmMmXSp933tXR ulzcGy+mUHdPWyDnbSig7FiuOq/AEFkZ9ygtdiG97asqY9/uv3zc8w== =mrV7 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBOXXSFSh9+71yA2DNAQFMDgP/a1/yPVvsiKVoAgSKM9zEZ/5bHxT4NVxx qloKy8AmK0JTXlChllYgu2McRCt/950F1y0jCLOPwLtTGg1HgMrjgNwq0HJn9yEV HSnIhAKpYYArbz2OLx/FXBFug6cNDv2UzStjrAN/OLnfgsbvQxmknYIQMCnLVaBi 6nCffPpQZck= =SLWk -----END PGP SIGNATURE-----