Unpatched flaw could take down Microsoft's IIS server

A hacker has posted code that could be used to install unauthorized software on some versions of the server

A hacker has posted code that could be used to take over a system running Microsoft IIS (Internet Information Services) server.

The software, which was posted to the Milw0rm Web site on Monday, could be a big problem for some webmasters, however the attack appears to work only on older versions of Microsoft's products.

It was not immediately clear how many versions of Microsoft's products are vulnerable to the attack, and Microsoft has not yet posted a security advisory on the issue.

The flaw lies in the File Transfer Protocol (FTP) software used by IIS to move large files around the Internet, so the victim would have to have FTP enabled in order to be vulnerable to the attack.

According to the Milw0rm post, an attacker could use this code to install unauthorized software on the server.

According to Nikolaos Rangos, the Milw0rm poster, the code works on Microsoft's decade-old Windows 2000 operating system, while running the older IIS 5.0 server. For the attack to work, the hacker would also need to be able to create a directory on the server, security experts say.

Other versions of IIS are also at risk, according to Thierry Zoller, chief security officer with security consultancy G-SEC, who has studied the issue. However, newer versions of Microsoft's operating systems have features that make it less serious, he added via instant message.

Rangos, who discovered the flaw, said he scanned several ranges of IP addresses to see how many IIS servers running FTP he could find. He said he found a lot of Windows Server 2003 systems running the FTP software with IIS 6. However, IIS 5 on Windows 2000 is "vanishing slowly," he said.

The attack also works on IIS 6, he said, but because IIS 6 has a defensive measure called "stack cookie protection," the code can only be used to crash IIS 6 running on Windows Server 2003, Rangos said.

Rangos did not notify Microsoft before posting his attack code, so the company has not had much time to work out a fix.

In an e-mail message, Microsoft said it was looking into the matter and was "unaware of any attacks trying to use the claimed vulnerability or of customer impact."

Join the CSO newsletter!

Error: Please check your email address.

Tags iisexploits and vulnerabilitiesMicrosoftiis serverFTP

More about MicrosoftSEC

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Robert McMillan

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place