Microsoft Warns of Bug in IIS Server, Yet Again

For the second time this year, Microsoft issued a security advisory for possible vulnerabilities in its Internet Information Services (IIS) Web server software.

Prior to the advisory's release Tuesday, Redmond had said that IIS 5.0 and IIS 6.0 could be affected. In those versions of the software, the File Transfer Protocol (FTP) service may be porous enough to allow incursions. In Tuesday's announcement, the software giant stated that IIS 5.0, 5.1 and 6.0 could all be affected by "publicly disclosed vulnerabilities."

Such bugs, Microsoft said, "could allow remote code execution on affected systems that are running the FTP service and are connected to the Internet."

Vulnerabilities affecting IIS have been seen before. In May, Redmond issued a security advisory to address holes in IIS versions 5.0, 5.1 and 6.0. The software giant at the time said that it wasn't aware of any "known attacks" against IIS (as with this release), but that it was looking into the matter.

Tuesday's security advisory comes just after proof-of-concept code was released on the Milw0rm exploit discussion portal. According to Milw0rm, the bugs exploit holes in IIS 5.0 and 6.0 running on Windows 2000, enabling a remote code execution exploit via a stack overflow.

Microsoft issued this security advisory to address not just Windows 2000, but also XP, Vista, Windows Server 2003, Windows Server 2008 and even Windows 7.

IIS is among the world's most frequently used Web server applications, second only to the Apache HTTP server. Redmond has tried to address the threats in various ways.

About this time last year, Microsoft released the Web version of a tool called UrlScan 3.0, a complement to IIS that tracks and authenticates HTTP server requests, potentially blocking malicious code. Apparently hackers have studied this tool and have figured out a way to circumvent its effectiveness.

The problem has become so pervasive that as a follow up to its own advisory in May, the United States Computer Emergency Readiness Team issued another advisory this week saying that it "encourages administrators to disable anonymous write access to the FTP server to help mitigate the vulnerability." U.S. CERT added that "a proper impact analysis should be performed prior to taking defensive measures."

Security pros are taking notice as well.

"A workaround would be to set permissions on the FTP server to 'not allow' a remote user to create a directory on the FTP server," said Paul Henry, security and forensic analyst at Lumension.

Previous workarounds presented by Microsoft include making recommendations that system administrators maintain file system access control lists (ACLs) that are solid and enforceable. With a clamp-down on access control security, the elevation of privilege problem is lessened.

However security specialists and observers are still awaiting another patch for IIS, especially since Microsoft found it important enough to issue a formal advisory.

"The [exploits] can easily be automated by combining with a scanning tool and we will see an increase in scanning for open FTP ports soon," said Wolfgang Kandek, chief technology officer at Qualys. "In addition to running IIS, vulnerable FTP servers also have to allow write access. This cuts down on the number of potential targets, but unfortunately even anonymous write access is good enough to make the server vulnerable."

About the Author

Jabulani Leffall is a business consultant and an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others. He consulted for Deloitte & Touche LLP and was a business and world affairs commentator on ABC and CNN.

Featured

  • college student sitting at a laptop writing a college essay

    How Can Schools Manage AI in Admissions?

    Many questions remain around the role of artificial intelligence in admissions as schools navigate the balance between innovation and integrity.  

  • a hobbyist in casual clothes holds a hammer and a toolbox, building a DIY structure that symbolizes an AI model

    Ditch the DIY Approach to AI on Campus

    Institutions that do not adopt AI will quickly fall behind. The question is, how can colleges and universities do this systematically, securely, cost-effectively, and efficiently?

  • person signing a bill at a desk with a faint glow around the document. A tablet and laptop are subtly visible in the background, with soft colors and minimal digital elements

    California Governor Signs AI Content Safeguards into Law

    California Governor Gavin Newsom has officially signed off on a series of landmark artificial intelligence bills, signaling the state’s latest efforts to regulate the burgeoning technology, particularly in response to the misuse of sexually explicit deepfakes. The legislation is aimed at mitigating the risks posed by AI-generated content, as concerns grow over the technology's potential to manipulate images, videos, and voices in ways that could cause significant harm.

  • laptop screen showing Coursera course

    Coursera Introduces New Gen AI Skills Training and Credentials

    Learning platform Coursera is expanding its Generative AI Academy training portfolio with an offering for teams, as well as adding new generative AI courses, specializations, and certificates.