-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

           ESB-2001.202 -- Microsoft Security Bulletin MS01-025
          Index Server Search Function Contains Unchecked Buffer
                                15 May 2001

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                Index Server 2.0
                        Indexing Service for Windows 2000
Vendor:                 Microsoft
Operating System:       Windows NT
                        Windows 2000
Impact:                 Execute Arbitrary Code/Commands
                        Read-only Data Access
Access Required:        Local
                        Remote

Ref:                    ESB-2000.063

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ----------------------------------------------------------------------
Title:      Index Server Search Function Contains Unchecked Buffer
Date:       10 May 2001
Software:   Index Server 2.0, Indexing Service for Windows 2000
Impact:     Run code of attacker's choice; file disclosure
Bulletin:   MS01-025

Microsoft encourages customers to review the Security Bulletin at: 
http://www.microsoft.com/technet/security/bulletin/MS01-025.asp.
- - ----------------------------------------------------------------------

Issue:
======
The patches provided in the bulletin address two security
vulnerabilities that are unrelated to each other except in the sense
that both affect Index Server 2.0. The first vulnerability is a
buffer overrun vulnerability. Index Server 2.0 has an unchecked
buffer in a function that processes search requests. If an overly
long value were provided for a particular search parameter, it would
overrun the buffer. If the buffer were overrun with random data, it
would cause Index Server to fail. If it were overrun with carefully
selected data, code of the attacker's choice could be made to run on
the server, in the Local System security context. 

The second vulnerability affects both Index Server 2.0 and Indexing
Service in Windows 2000, and is a new variant of the "Malformed
Hit-Highlighting" vulnerability discussed in Microsoft Security
Bulletin MS00-006
(http://www.microsoft.com/technet/security/bulletin/MS00-006.asp).
The new variant has almost the same scope as the original
vulnerability, but potentially exposes a new file type If an attacker
provided an invalid search request, she could read "include" files
residing on the web server. The new patch eliminates all known
variants of the vulnerability. 

Mitigating Factors:
====================
Index Server 2.0 buffer overrun: 
 - The vulnerability only affects Index Server 2.0. Indexing 
   Services in Windows 2000 is not affected by it. 
 - In order to exploit the vulnerability, the attacker would 
   need the ability to authenticate to the server and to 
   create a named pipe connection to it (which requires access
   to NetBIOS, which should be blocked at the firewall). As a 
   result, it is likely that this vulnerability could, in a 
   properly configured network, only be exploited by an intranet 
   user. 
 - Index Server 2.0 is not provided as part of Windows NT 4.0; 
   instead, it is part of the Windows NT 4.0 Option Pack. It 
   installs by default as part of that package, but does not run 
   by default. 
New Variant of "Malformed Hit-Highlighting" vulnerability: 
 - The vulnerability would only allow files to be read. They 
   could not be added, changed or deleted via this vulnerability. 
 - Server-side "include" files should not contain sensitive data. 
   If this recommendation has been followed, there would be no 
   sensitive data to compromise via this vulnerability. 
 - The vulnerability would only allow files residing on the web 
   server - and in the same logical drive as the server's root 
   directory - to be read. It would not allow files elsewhere 
   on the server, or files residing on a remote server, to be read. 

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the 
   Security Bulletin
   http://www.microsoft.com/technet/security/bulletin/ms01-025.asp
   for information on obtaining this patch.

Acknowledgment:
===============
 - David Litchfield of @Stake (http://www.atstake.com) for reporting
   the Index Server 2.0 buffer overrun.
 - Mike Mulling (http://www.gap.com) for reporting the new variant 
   of the "Malformed Hit-Highlighting" vulnerability 

- - ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.



- -----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOvtO440ZSRQxA/UrAQEBxggAnkaSQ+E+js2VA9L6Zsn8lV2HOtbf99pl
goZX7Lf9FjwyWzUyYD+rj8b2Yp+D9yMhuGkOWiN12oCb+LDdFQZXQ/WIdSuCEQGA
dUbUDVE5MQoQMpF3flH8FLd9zCjJ2UPJV8Bq713P/Py8j4NabDguiuU0x65ndrKc
AwoxTks+VC1obkpUrxcR5YBh3pKBGHPaOtaudG/iZqgsalUKa/TlLQMxWqm3XC80
Uq6ZzsObSCFPKCHWD4TPLBTNLHOiUB64JHECBLsbqrGVdClwhgLeFzUViy0OoFFh
Cat4Z/53cUj08Dc3nKlCVJpsfUxNHG7iSxhzNtBu8UcalurOWtKDaQ==
=PDlo
- -----END PGP SIGNATURE-----


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOwEKnSh9+71yA2DNAQEjeAQAlN0naEyE4drAIo1v15W/RrMaeMc5xb45
/f9/BI3qdl1JdDMNJJmZqzCpkyAAPWMA0Dgm/Q8fsZy1KAbizG7uY2cQBDpU/0c2
THA8/R/mNPnt/5DBlEvGW1XL3l6oOV4RqfNpcPoSSb2OR16PefotGVtCyzF9jPtg
le4EBdDIEW4=
=A5tM
-----END PGP SIGNATURE-----