The Top 10 Bugs in Windows 2000 From Jesper Johanssen’s W2K Security Vulnerabilities Lecture.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

CGI & HTML forms CGI Common Gateway Interface  A web server is only a pipe between user-agents  and content – it does not generate content.
Internet Information Server 6.0. IIS 6.0 Enhancements  Fundamental changes, aimed at: Reliability & Availability Reliability & Availability Performance.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
DT211/3 Internet Application Development Active Server Pages & IIS Web server.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Computer Security and Penetration Testing
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
CSE331: Introduction to Networks and Security Lecture 31 Fall 2002.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Chapter 6: Hostile Code Guide to Computer Network Security.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Managing Client Access
IT:Network:Applications Fall  Running one “machine” inside another “machine”  OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Chapter 6: Forms JavaScript - Introductory. Previewing the Product Registration Form.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Basics of Web Databases With the advent of Web database technology, Web pages are no longer static, but dynamic with connection to a back-end database.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Web Application Access to Databases. Logistics Test 2: May 1 st (24 hours) Extra office hours: Friday 2:30 – 4:00 pm Tuesday May 5 th – you can review.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
JavaScript, Fourth Edition
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Lesson 15 Client Side Vulnerabilities and you. Active Server Pages MS’s answer to the scripting world of PERL and CGI on Unix Usually Written In Visual.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
9 Chapter Nine Compiled Web Server Programs. 9 Chapter Objectives Learn about Common Gateway Interface (CGI) Create CGI programs that generate dynamic.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
ASP Introduction Y.-H. Chen International College Ming-Chuan University Fall, 2004.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Lecture Note 1: Getting Started With ASP.  Introduction to ASP  Introduction to ASP An ASP file can contain text, HTML tags and scripts. Scripts in.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
Web Access. Overview  Purpose  Prerequisites  Install Components  Enable Virtual Directories  IIS Configuration & Security  Troubleshooting.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Users and Documents.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
ASP. ASP is a powerful tool for making dynamic and interactive Web pages An ASP file can contain text, HTML tags and scripts. Scripts in an ASP file are.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Plug-In Architecture Pattern. Problem The functionality of a system needs to be extended after the software is shipped The set of possible post-shipment.
Software Security. Bugs Most software has bugs Some bugs cause security vulnerabilities Incorrect processing of security related data Incorrect processing.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
3.1 Types of Servers.
TMG Client Protection 6NPS – Session 7.
3.1 Types of Servers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
A Distributed DoS in Action
Configuring Internet-related services
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

The Top 10 Bugs in Windows 2000 From Jesper Johanssen’s W2K Security Vulnerabilities Lecture

MS01-036: Active Directory Password Changing  LDAP over SSL can be used to change users password  Directory fails to check credentials  Password can be changed by anyone  Review AD permissions. Pre-W2K compatible access group gives access to AD from low-level client. Default: Everyone is added to this group. The group has READ on every attribute of every object in the AD. Attributes can be queried over LDAP.

MS  Only on DC that are configured to allow LDAP over SSL on TCP port 636  Solution: remove the EVERYONE group from the Pre-W2K Compatible Access group and reboot all DC  This may break access to Win9x systems  Patch: – D=31065

MS00-078: Directory Traversal Vulnerability  One of the SANS Top 20 threats  Replace the / in the../ with a UTF-8 Unicode representation of a / (%co%af)  Attacker has full read access to everything in the IIS partition that the IUSR account has read access to.  Focus on %systemdrive% gives access to that drive. Can run any program on the IIS server.  Test URL: htttp://your-server- name/scripts/..%c0%af../winnt/system32/cmd.exe ?/c+dir+c:\

MS00-086: File Request Parsing Vulnerability  Attacker can append shell commands to an HTTP request  Commands will be run by OS  Important to check permissions on system binaries  Lots of preconditions before this attack works

MS  Preconditions – A.CMD or.BAT file must be on the server – It must exist in an executable sub-dir of IIS – File size > 0 length  Test: exe would list the C directory exe  Fixed by SP2

MS01-026: CGI Decoding Error  IIS receives Web request – It decoded the request to remove escape chars and unicode – A security check is run on the decoded request – Request is decoded again  The 2 nd request may not have passed the 1 st security check and is passed  Patch: ReleaseID=29787 (IIS4.0), (IIS5.0)

IIS Buffer Overflows  MS – Internet Printing Protocol ISAPI – Shipped by default in W2K Server, Adv Server, DataCenter Server – IPP allows remote users to submit print requests across the Net. – You configure a URL as the location of the printer – Send very long header in the http request to the server will run commands on the server. FIX THIS ASAP! – Remove.printer extension form supported ISAPI extensions in IIS. Disable IPP by group policy.

IIS Buffer Overflows  MS – FrontPage Server Extension Sub-Component Buffer Overflow vulnerability – Visual Interdev RAD Remote Deployment Support component is an optional component of IIS used by Visual Interdev 6.0. – Patch: ReleaseID=31038 (NT4.0), 30727(W2K)

IIS Buffer Overflows  MS – ISAPI idq.dll buffer overflow vulnerability – Mentioned in the SANS Top 20 list. Refer to it for more detail. – Affects all W2K servers running Indexing Services – This bug allows Code Red and Nimda to exploit your system. – Patches: ReleaseID=30833, 30800

IIS Cross-site Scripting & Code Submission Vulnerabilities  Cross-scripting: ability to insert a script into a WWW request  Used to relay script code from a bad site to a secured site to the user’s browser where it’s executed  Append the script code to a URL on the bad www site OR embed it in an HTML formatted e- mail.  Fix: apply SP2

MS01-007: Executing Code as SYSTEM with NetDDE  NetDDE (Network Dynamic Data Exchange) is used for interprocess communication  NetDDE service runs as SYSTEM  Client processes can send messages to server process  Message can include code to run  Any user can start the NetDDE Mgr Service and talk to 3 trusted shares: chat$, CLPBK$ and hearts$. You can bind a program to that share and NetDDE server will run it  Patch: ReleaseID=27526

Programs Open DLLs on Startup  When a user opens a document by double clicking it in Explorer or using the start:run menu, most programs (like Office) will try to find some DLLs. If any of these DLLs are found in the dir where the doc lives, MS will execute them as part of the load process.  DLL and program must NOT be already loaded in memory for this to work.

Programs Open DLLs on Startup  One Exploit – programs store all attachments in a known directory as soon as they are received – Attacker mails a rogue DLL and then mails an doc that uses that DLL. – When the user opens the doc, the DLL fires up. – Outlook is exempt from this since it doesn’t store the attachment until it’s opened

VBScript Worms and Other Outlook Problems  Outlook includes a powerful macro language – Used by the Melissa family of worms  Apply the Outlook Security Patch! – Blocks vbs, exe, com, bat, cmd, pif, mdb attachments – Sets Outlook to execute in the restricted sites zone

MS00-043: Buffer Overflow in OL Express & Outlook  Attacker can send malformed header to OE or OL  Inetcomm.dll crashes  Attacker gets to execute code  Immediate MUST FIX!  Patch: SP1, IE5.5 SP 1, OE 5.01 Patch,

Outlook Express Converts Subject to Attachments  OE converts a long subject to a text attachment  Attacker can choose the Icon used by the attachment  Microsoft hasn’t decided if this is a feature or bug or 

Summary  These are some of the more serious Windows 2000 vulnerabilities  The fix is simple: Install the Patches  The consequence: attackers take control of the system for their purposes  Liability issue since the patches are available. Why didn’t you install them?