Article ID: 288855
Article Last Modified on 11/21/2006
APPLIES TO
- Microsoft Internet Information Services 5.0
- Microsoft Internet Information Server 4.0
This article was previously published under Q288855
SYMPTOMS
In Microsoft Internet Information Services (IIS) 5.0 and Microsoft Internet Information Server (IIS) 4.0, if a user wants to log onto an FTP server by using a domain user account, rather than a local one, they are required to precede it with the name of the domain. However, if the user precedes an account name with a particular set of characters, a flaw causes the FTP service to search the domain and all trusted domains for the user account. If the user enters the correct password for the account, they are logged into it.
Mitigating Factors:
- This vulnerability can only be exploited if the FTP server is a domain member. However, this is usually not appropriate for Internet-connected FTP servers.
- This vulnerability can only be exploited if the Guest account on the local computer has been disabled, and the Guest account on a trusted domain is enabled. By default, the Guest account is disabled in Windows NT Server 4.0 and Windows 2000.
CAUSE
If a user ID is specified in a particular way when a user logs onto an affected FTP server, the system automatically searches all trusted domains for a user ID that matches it. If the user ID is found and the correct password is provided, the system will allow the user to log into it normally.
RESOLUTION
For additional information on what is fixed by these patches, click the article number below to view the article in the Microsoft Knowledge Base:
297860 IIS 5.0 Security and Post-Windows NT 4.0 SP5 IIS 4.0 Patch Rollup
Internet Information Services 5.0
To resolve this problem, either obtain the hotfix referenced in this section or Windows 2000 Security Rollup Package 1 (SRP1). For additional information about SRP1, click the article number below to view the article in the Microsoft Knowledge Base:
311401 Windows 2000 Security Rollup Package 1 (SRP1), January 2002
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
The following file is available for download from the Microsoft Download Center:
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.
The English version of this fix should have the following file attributes or later:
Date Time Version Size File name -------------------------------------------------------- 05/04/2001 11:48a 5.0.2195.3554 245,520 Adsiis.dll 05/04/2001 11:48a 5.0.2195.3554 332,560 Asp.dll 08/26/2000 06:30p 6,512 Fixerr.js 11/10/2000 11:21p 4.0.2.4701 593,976 Fp4autl.dll 03/27/2001 10:10p 0.9.3940.21 445,712 Httpext.dll 05/04/2001 11:48a 5.0.2195.3554 56,592 Httpodbc.dll 05/04/2001 11:48a 5.0.2195.3554 122,640 Iisrtl.dll 05/04/2001 11:48a 5.0.2195.3554 13,584 Infoadmn.dll 05/04/2001 11:48a 5.0.2195.3554 245,520 Infocomm.dll 05/04/2001 11:48a 5.0.2195.3554 62,736 Isatq.dll 05/04/2001 11:48a 5.0.2195.3554 46,352 Ism.dll 05/04/2001 11:48a 5.0.2195.3555 76,560 Msw3prt.dll 10/17/2000 01:38p 5.0.2195.2507 6,928 Schmupd.exe 05/04/2001 11:48a 5.0.2195.3554 41,232 Ssinc.dll 05/04/2001 11:48a 5.0.2195.3554 7,440 W3ctrs.dll 05/04/2001 11:48a 5.0.2195.3554 357,648 W3svc.dll
NOTE: This patch can be installed on systems running Windows 2000 Gold, Windows 2000 Service Pack 1, or Windows 2000 Service Pack 2.
Internet Information Server 4.0
A supported hotfix is now available from Microsoft, but it is only intended to correct the problem that this article describes. Apply it only to systems that you determine are at risk of attack. Evaluate the computer's physical accessibility, network and Internet connectivity, and other factors to determine the degree of risk to the computer. See the associated Microsoft Security Bulletin to help determine the degree of risk. This hotfix may receive additional testing. If the computer is sufficiently at risk, we recommend that you apply this hotfix now.
To resolve this problem immediately, download the hotfix by following the instructions later in this article or contact Microsoft Product Support Services to obtain the hotfix. For a complete list of Microsoft Product Support Services telephone numbers and information about support costs, visit the following Microsoft Web site:
Note In special cases, charges that are ordinarily incurred for support calls may be canceled, if a Microsoft Support Professional determines that a specific update will resolve your problem. The usual support costs will apply to additional support questions and issues that do not qualify for the specific update in question. The following file is available for download from the Microsoft Download Center:
NOTE: Q295534is.exe contains the Symbols files.
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.
The English version of this fix should have the following file attributes or later:
Date Time Version Size File name -------------------------------------------------------- 04/11/2001 01:32p 4.2.764.1 214,544 Adsiis.dll 04/11/2001 01:33p 4.2.764.1 330,672 Asp.dll 04/02/2001 04:55p 4.0.2.4701 593,976 Fp4autl.dll 04/11/2001 01:32p 4.2.764.1 81,888 Ftpsvc2.dll 04/11/2001 01:32p 4.2.764.1 55,392 Httpodbc.dll 04/11/2001 01:32p 4.2.764.1 98,912 Iischema.dll 04/11/2001 01:31p 4.2.764.1 63,472 Iislog.dll 04/11/2001 01:31p 4.2.764.1 185,792 Infocomm.dll 04/11/2001 01:31p 4.2.764.1 29,520 Iscomlog.dll 04/11/2001 01:35p 4.2.764.1 54,560 Ism.dll 04/02/2001 04:55p 4.0.1381.7086 375,056 Kernel32.dll 04/11/2001 01:36p 4.2.764.1 9,680 Schmupd.exe 04/11/2001 01:32p 4.2.764.1 38,256 Ssinc.dll 04/11/2001 01:32p 4.2.764.1 25,360 Sspifilt.dll 04/11/2001 01:32p 4.2.764.1 229,024 W3svc.dll 04/11/2001 01:31p 4.2.764.1 88,032 Wam.dll
NOTE: This patch can be installed on systems running Windows NT 4.0 Service Pack 5 or Windows NT 4.0 Service Pack 6a.
STATUS
Microsoft has confirmed that this problem may cause a degree of security vulnerability in Internet Information Services 5.0 and Internet Information Server 4.0. This problem was first corrected in Windows 2000 Service Pack 3.
MORE INFORMATION
For additional information about how to obtain a hotfix for Windows 2000 Datacenter Server, click the article number below to view the article in the Microsoft Knowledge Base:
265173 The Datacenter Program and Windows 2000 Datacenter Server Product
For additional information about how to install multiple hotfixes with only one reboot, click the article number below to view the article in the Microsoft Knowledge Base:
296861 Use QChain.exe to Install Multiple Hotfixes with One Reboot
For more information on this vulnerability, see the following Microsoft Web site:
Additional query words: kbIISCom security_patch kbWin2000srp1
Keywords: kbbug kbfix kbwin2000presp3fix kbgraphxlinkcritical kbsecvulnerability kbwin2000sp3fix kbsecurity kbsechack KB288855