Security News > 2001 > August > Security Alert, August 17, 2001: Multiple Vulnerabilities in ISA 2000 Server, IIS 5.0, and IIS 4.0; DoS Condition in Windows NNTP Service
**** This Security Alert is brought to you by the Windows IT Security channel on the Windows 2000 Magazine Network **** http://www.win2000mag.net/channels/security ============================================================ Sponsored by ONE CHANNEL WORTH FLIPPING TO! http://go.win2000mag.net/UM/T.asp?A2153.23115.1322.1.532985 ============================================================ Who has time to surf? Our new Exchange & Outlook Web channel delivers news, articles, discussion forums, FAQs, and technical solutions in one, easy-to-navigate Web site. Check it out! http://go.win2000mag.net/UM/T.asp?A2153.23115.1322.1.532985 ******************** Security Alert, August 17, 2001 * MULTIPLE VULNERABILITIES IN ISA 2000 SERVER Peter Grundl and Dr. Hiromitsu Takagi discovered two vulnerabilities in Microsoft Internet Security and Acceleration (ISA) Server 2000. The first vulnerability stems from a memory leak condition in the H323asn1.dll file used to process H.323 Gatekeeper Voice over IP (VoIP) data and Winsock Proxy services. The second problem is a cross-site scripting vulnerability affecting the error page that ISA Server generates in response to a request for a non-existent page or an unsuccessful connection attempt to a page. http://www.WindowsITsecurity.com/articles/index.cfm?articleID=22178 * MULTIPLE VULNERABILITIES IN IIS 5.0 AND 4.0 John Waters, NSFocus, and Oded Horovitz discovered five vulnerabilities in Internet Information Services 5.0 and Microsoft Internet Information Server (IIS) 4.0. The five vulnerabilities include three Denial of Service (DoS) conditions, a buffer overflow condition, and a privilege elevation condition. Microsoft has released a detailed bulletin (MS01-044) as well as patches to remedy these problems. http://www.WindowsITsecurity.com/articles/index.cfm?articleID=22177 * DENIAL OF SERVICE CONDITION IN MICROSOFT NNTP SERVICE FOR WINDOWS 2000/NT Aiden ORawe reported that a memory leak exists in the way certain Windows OSs process new postings when using the Network News Transfer Protocol (NNTP) service. If an attacker sends a large number of posts with a particular construction, those posts can deplete the server's available memory and disrupt service. A user can reboot the server to resume normal service. Only servers that accept new postings are vulnerable to this condition. Microsoft is aware of the vulnerability and has released patches to remedy the problem. http://www.windowsitsecurity.com/Articles/Index.cfm?ArticleID=22149 Thank you for subscribing to Security UPDATE. Please tell your friends about this newsletter and alert list! Sincerely, The Security UPDATE Team (security () win2000mag net) SUBSCRIBE To subscribe send a blank email to subscribe-Security_UPDATE () list win2000mag net If you have questions or problems with your UPDATE subscription, please contact securityupdate () win2000mag com ___________________________________________________________ Copyright 2001, Penton Media, Inc. - ISN is currently hosted by Attrition.org To unsubscribe email majordomo () attrition org with 'unsubscribe isn' in the BODY of the mail.
News URL
http://www.win2000mag.net/channels/security
Related news
- New Windows Server 2012 zero-day gets free, unofficial patches (source)
- Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities (source)
- Windows 11 installation media bug causes security update failures (source)
- Windows 11 Media Update Bug Stops Security Updates (source)
- Windows 10 users urged to upgrade to avoid "security fiasco" (source)
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers (source)
- Security pros baited with fake Windows LDAP exploit traps (source)
- Microsoft 365 apps crash on Windows Server after Office update (source)
- Rsync vulnerabilities allow remote code execution on servers, patch quickly! (source)
- SAP fixes critical vulnerabilities in NetWeaver application servers (source)