[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-Disclosure] Buffer Overrun in SmartHTML Interpreter Could Allow Code Executio
From:       "Bharadwaj, Maninder" <maninder.bharadwaj () digital ! com>
Date:       2002-09-27 13:19:51
[Download RAW message or body]

Buffer Overrun in SmartHTML Interpreter Could Allow Code Execution (Q324096)


Originally posted: September 25, 2002


Summary


Who should read this bulletin: Web site administrators using Microsoft®
FrontPage Server Extensions 

Impact of vulnerability: Buffer overrun or denial of service 

Maximum Severity Rating: Critical 

Recommendation: Web site administrators should apply the patch or ensure
that the SmartHTML Interpreter is not available on the server. 

Affected Software: 

*	Microsoft FrontPage Server Extensions 2000 
*	Microsoft FrontPage Server Extensions 2002 
*	Microsoft Windows 2000 (shipped FPSE 2000) 
*	Microsoft Windows XP (shipped FPSE 2000) 

Technical details 

Technical description: 



The SmartHTML Interpreter (shtml.dll) is part of the FrontPage Server
Extensions (FPSE), and provides support for web forms and other
FrontPage-based dynamic content. The interpreter contains a flaw that could
be exposed when processing a request for a particular type of web file, if
the request had certain specific characteristics. This flaw affects the two
versions of FrontPage Server Extensions differently. On FrontPage Server
Extensions 2000, such a request would cause the interpreter to consume most
or all CPU availability until the web service was restarted. An attacker
could use this vulnerability to conduct a denial of service attack against
an affected web server. On FrontPage Server Extensions 2002, the same type
of request could cause a buffer overrun, potentially allowing an attacker to
run code of his choice. 

Mitigating factors: 

*	The IIS
<http://www.microsoft.com/technet/security/tools/locktool.asp> Lockdown
Tool, if used to configure a static web server, disables the SmartHTML
Interpreter. Servers on which this has been done could not be affected by
the vulnerability. 
*	FrontPage Server Extensions install on IIS 4.0, 5.0 and 5.1 by
default, but can be uninstalled if desired. Servers on which this has been
done could not be affected by the vulnerability. 

Severity Rating: 

	Internet Servers	 Intranet Servers	 Client Systems	
FrontPage Server Extensions 2000	 Critical	 Moderate
None	
FrontPage Server Extensions 2002	 Critical	 Moderate
None	
The above assessment
<http://www.microsoft.com/technet/security/topics/rating.asp>  is based on
the types of systems affected by the vulnerability, their typical deployment
patterns, and the effect that exploiting the vulnerability would have on
them. 

Vulnerability identifier: CAN-2002-0692
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0692>  

Tested Versions:
Microsoft tested FrontPage Server Extensions 2000 and 2002 to assess whether
they are affected by these vulnerabilities. Previous versions are no longer
supported <http://support.microsoft.com/directory/discontinue.asp> , and may
or may not be affected by these vulnerabilities.

Frequently asked questions 

What's the scope of the vulnerability?

This is a denial
<http://www.microsoft.com/technet/security/bulletin/glossary.asp> of service
and buffer overrun vulnerability. It affects FrontPage Server Extensions
2000 and 2002 differently. With FrontPage Server Extensions 2000, the flaw
could cause most CPU availability to be consumed until the web service is
restarted. An attacker could use this vulnerability to conduct a denial of
service attack against an affected web server. With FrontPage Server
Extensions 2002, the same flaw in the interpreter causes a buffer overrun,
potentially allowing an attacker to run code of the his choice. 

Web site administrators who have used the IIS
<http://www.microsoft.com/technet/security/tools/locktool.asp> Lockdown Tool
to configure their servers as static web servers are already protected
against attacks that would attempt to exploit the vulnerability. 

What causes the vulnerability?

The vulnerability results because of a flaw in the FrontPage Server
Extensions SmartHTML interpreter. The interpreter can enter a mode in which
it consumes all CPU availability on a web server using FrontPage Server
Extensions 2000 or can result in a buffer overrun in FrontPage Server
Extensions 2002, if it receives a request for a particular type of web file,
along with some specific parameters.

What are the FrontPage Server Extensions?

FrontPage
<http://msdn.microsoft.com/library/en-us/dnservext/html/fpovrw.asp> Server
Extensions (FPSE) is a set of tools that can be installed on a
FrontPage-based web site. They serve two basic functions: to allow
authorized personnel to manage the server, add or change content, and
perform other tasks; and to add functions that are frequently used by web
pages, such as search and forms support. 

FPSE installs by default as part of IIS 4.0, 5.0 and 5.1. However, it can be
uninstalled if desired. Microsoft has long recommended that web
administrators uninstall FPSE if not needed. 

What is the SmartHTML interpreter?

The SmartHTML interpreter, shtml.dll, is part of FPSE, and supports certain
types of dynamic web content. For instance, using SmartHTML, a web developer
can build a web page that relies on FrontPage features, but not actually
have those features embedded within the page until a user requests it.

For example, a web developer might want to embed the current date and time
in a web page. In order to do that, the developer might use one of the
WebBot components that come with FrontPage. A WebBot component gives an
author CGI capabilities without writing CGI applications. The web page
author inserts a WebBot into an HTML page. What actually gets inserted is a
specially formatted HTML comment. A WebBot comment looks like a standard
HTML comment with special notation that identifies the WebBot and its
properties. You set the property values from a dialog box when the WebBot
gets inserted. Each WebBot has its own dialog. Microsoft calls the WebBot
notation SmartHTML, and HTML pages containing them SmartHTML pages. 

A WebBot is "executed" when the FrontPage Editor saves the HTML page. A
FrontPage Server Extension app scans the page for embedded WebBot components
and replaces them with standard HTML text. As a result of this scanning
process, a new page is created containing the standard HTML text generated
from the WebBot components and the web visitor sees the date and time
rendered on the web page.

What's wrong with the SmartHTML interpreter?

If a request for a certain type of web file is made in a particular way, it
could have the effect on a web server using FrontPage Server Extensions 2000
of causing the SmartHTML interpreter to cycle endlessly, consuming all of
the server's CPU availability and preventing the server from performing
useful work. On a web server using FrontPage Server Extensions 2002, this
same type of request could have the effect of causing a buffer overrun and
potentially allowing an attacker to run malicious code on that server.

What could an attacker do via this vulnerability?

In the case of FrontPage Server Extensions 2000, an attacker could use this
vulnerability to monopolize a server and prevent legitimate users from being
able to use the web server. In the case of FrontPage Server Extensions 2002,
an attacker could potentially cause a buffer overrun on the web server.

How might an attacker exploit the vulnerability?

The attack itself would only require that the attacker levy a particular
type of request on the SmartHTML interpreter. Upon attempting to process the
request (in the case of FrontPage Server Extensions 2000), the interpreter
would begin to "freewheel", and would continue to do so until the
administrator stopped and restarted the web service. In some cases, it might
be necessary to reboot the system in order to do this. In the case of
FrontPage Server Extensions 2002, the request could cause a buffer overrun
in the interpreter and allow code of the attacker's choice to run in the
context of the interpreter.

If an attacker exploited the buffer overrun in FrontPage Server Extensions
2002, in what context would the hostile code run?

In the case of the buffer overrun in FrontPage Server Extensions 2002, the
malicious code would run as system, even though getting to system would take
a convoluted exploit. Nonetheless, it is possible to that an attacker could
create such an exploit and be running as system.

What steps could an administrator take to protect against the vulnerability?

Of course, the simplest way to eliminate the vulnerability is to install the
patch. But even if the patch were not installed, a server wouldn't be at
risk if FPSE had been uninstalled, or if the SmartHTML interpreter were not
in use. For instance, the IIS
<http://www.microsoft.com/technet/security/tools/locktool.asp> Lockdown
Tool, if used to configure a static web server, disables the interpreter.

How does the patch eliminate the vulnerability?

The patch causes the SmartHTML interpreter to reject the requests at issue
here, as they aren't valid requests.






























































Patch availability


Download locations for this patch 

*	Microsoft FrontPage Server Extensions 2002 for all platforms
http://download.microsoft.com/download/FrontPage2002/fpse1002/1/W98NT42KMeXP
/EN-US/fpse1002.exe
<http://download.microsoft.com/download/FrontPage2002/fpse1002/1/W98NT42KMeX
P/EN-US/fpse1002.exe>  
*	Microsoft FrontPage Server Extension 2000 for NT4
http://download.microsoft.com/download/fp2000fd2000/Patch/1/W9XNT4Me/EN-US/f
pse0901.exe
<http://download.microsoft.com/download/fp2000fd2000/Patch/1/W9XNT4Me/EN-US/
fpse0901.exe>  
*	Microsoft FrontPage Server Extensions 2000 for Windows XP 


*	http://www.microsoft.com/downloads/release.asp?ReleaseID=42995
<http://www.microsoft.com/downloads/release.asp?ReleaseID=42995>  
*	Windows Update <http://windowsupdate.microsoft.com/>  

*	Microsoft FrontPage Server Extensions 2000 for Windows 2000 


*	http://www.microsoft.com/downloads/release.asp?ReleaseID=42954
<http://www.microsoft.com/downloads/release.asp?ReleaseID=42954>  
*	Windows Update <http://windowsupdate.microsoft.com/>  

Additional information about this patch 

Installation platforms: 
This patch can be installed on: 

*	FrontPage Server Extensions 2002: The patch can be applied on all
platforms which support FrontPage Server Extensions 2002. 
*	FrontPage Server Extensions 2000: The patches can be applied on the
following systems running FrontPage Server Extensions 2000 - Windows XP,
Windows 2000, and NT4. 

Inclusion in future service packs:
The fix for this issue will be included in Windows 2000 SP4, Windows XP SP2
and any future service packs for FPSE 2002. 

Reboot needed: Yes 

Patch can be uninstalled:


*	FrontPage Server Extensions 2000 patches on Windows 2000 and Windows
XP can be uninstalled. 
*	FrontPage Server Extensions 2000 patches for NT4 cannot be
uninstalled. 
*	FrontPage Server Extensions 2002 patches cannot be uninstalled. 

Superseded patches: None. 

Verifying patch installation: 

*	Users who are applying the patch on Windows 2000 or Windows XP
should refer to Q324096
<http://support.microsoft.com/default.aspx?scid=kb;en-us;Q324096>  
*	Users who are applying the patch for FrontPage Server Extensions
2000 please refer to Knoweldege Base article Q329085
<http://support.microsoft.com/default.aspx?scid=kb;en-us;Q329085>  
*	Users who are applying the patch for FrontPage Server Extensions
2002 please refer to Knoweldege Base article Q329086
<http://support.microsoft.com/default.aspx?scid=kb;en-us;Q329086>  

Caveats:
Users running FrontPage Server Extensions 2002 on any supported platform who
have not applied the latest update will need to apply the update before
installing this patch. To learn more about the update, please read Q317296
<http://support.microsoft.com/default.aspx?scid=kb;en-us;Q317296> . To go
directly to the FrontPage Server Extensions 2002 Update, click here
<http://download.microsoft.com/download/FrontPage2002/fpse1001/1/W98NT42KMeX
P/EN-US/fpse1001.exe> . 

Localization:
Localized versions of this patch are available at the locations discussed in
"Patch Availability". 

Obtaining other security patches: 
Patches for other security issues are available from the following
locations: 

*	Security patches are available from the Microsoft
<http://www.microsoft.com/downloads/search.asp?Search=Keyword&Value=%27secur
ity_patch%27&OpSysID=1> Download Center, and can be most easily found by
doing a keyword search for "security_patch". 
*	Patches for consumer platforms are available from the WindowsUpdate
<http://windowsupdate.microsoft.com/>  web site 


Other information: 


Acknowledgments 

Microsoft thanks
<http://www.microsoft.com/technet/security/bulletin/policy.asp>  Maninder
Bharadwaj of Digital Defense Services part of Digital GlobalSoft Ltd. for
reporting this issue to us and working with us to protect customers. 

Support: 

*	Microsoft Knowledge Base article Q324096 discusses this issue and
will be available approximately 24 hours after the release of this bulletin.
Knowledge Base articles can be found on the Microsoft Online
<http://support.microsoft.com/?scid=fh;en-us;kbhowto> Support web site. 
*	Technical support is available from Microsoft
<http://support.microsoft.com/directory/question.asp?sd=gn&fr=0> Product
Support Services. There is no charge for support calls associated with
security patches. 

Security Resources: The Microsoft TechNet
<http://www.microsoft.com/technet/security/default.asp> Security Web Site
provides additional information about security in Microsoft products. 

Exploit: 
The exploit could be provided for research and educational purposes on
request. 

Regards,

-------------------------------------------------
Maninder Bharadwaj
Senior Security Specialist- Digital Defense Services
Digital GlobalSoft Ltd.
(A subsidiary of Hewlett-Packard Co., USA)
Digital Park, Plot No. 39/40, Electronic City
Hosur Road, Bangalore - 561 229
-------------------------------------------------
Tel: +91 80 8528395 Ext 12171
Fax: +91 80 8528420
Email: maninder.bharadwaj@digital.com
Web:  www.digitalglobalsoft.com



[Attachment #3 (text/html)]

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">




<TITLE></TITLE>

<META content="MSHTML 6.00.2600.0" name=GENERATOR></HEAD>
<BODY><!--StartFragment -->&nbsp;
<P></P>
<H2>Buffer Overrun in SmartHTML Interpreter Could Allow Code Execution 
(Q324096)</H2>
<P><I><B>Originally posted:</B> September 25, 2002</I></P>
<H2>Summary</H2>
<BLOCKQUOTE>
  <P><B>Who should read this bulletin:</B> Web site administrators using 
  Microsoft® FrontPage Server Extensions </P>
  <P><B>Impact of vulnerability:</B> Buffer overrun or denial of service </P>
  <P><B>Maximum Severity Rating:</B> Critical </P>
  <P><B>Recommendation:</B> Web site administrators should apply the patch or 
  ensure that the SmartHTML Interpreter is not available on the server. </P>
  <P><B>Affected Software: </B></P>
  <UL>
    <LI>Microsoft FrontPage Server Extensions 2000 </LI>
    <LI>Microsoft FrontPage Server Extensions 2002 </LI>
    <LI>Microsoft Windows 2000 (shipped FPSE 2000) </LI>
    <LI>Microsoft Windows XP (shipped FPSE 2000) </LI></UL></BLOCKQUOTE>
<P><FONT color=#003399 size=2><B>Technical details</B></FONT> </P>
<BLOCKQUOTE><B>Technical description: </B><BR><BR>
  <P>The SmartHTML Interpreter (shtml.dll) is part of the FrontPage Server 
  Extensions (FPSE), and provides support for web forms and other 
  FrontPage-based dynamic content. The interpreter contains a flaw that could be 
  exposed when processing a request for a particular type of web file, if the 
  request had certain specific characteristics. This flaw affects the two 
  versions of FrontPage Server Extensions differently. On FrontPage Server 
  Extensions 2000, such a request would cause the interpreter to consume most or 
  all CPU availability until the web service was restarted. An attacker could 
  use this vulnerability to conduct a denial of service attack against an 
  affected web server. On FrontPage Server Extensions 2002, the same type of 
  request could cause a buffer overrun, potentially allowing an attacker to run 
  code of his choice. </P>
  <P><B>Mitigating factors:</B> </P>
  <UL>
    <LI>The <A 
    href="http://www.microsoft.com/technet/security/tools/locktool.asp">IIS 
    Lockdown Tool</A>, if used to configure a static web server, disables the 
    SmartHTML Interpreter. Servers on which this has been done could not be 
    affected by the vulnerability. </LI>
    <LI>FrontPage Server Extensions install on IIS 4.0, 5.0 and 5.1 by default, 
    but can be uninstalled if desired. Servers on which this has been done could 
    not be affected by the vulnerability. </LI></UL>
  <P><B>Severity Rating:</B> 
  <TABLE cellSpacing=0 cellPadding=5 border=1>
    <TBODY>
    <TR>
      <TH class=tabletext></TH>
      <TH class=tabletext>Internet Servers</TH>
      <TH class=tabletext>Intranet Servers</TH>
      <TH class=tabletext>Client Systems</TH></TR>
    <TR>
      <TH class=tabletext>FrontPage Server Extensions 2000</TH>
      <TD class=tabletext>Critical</TD>
      <TD class=tabletext>Moderate</TD>
      <TD class=tabletext>None</TD></TR>
    <TR>
      <TH class=tabletext>FrontPage Server Extensions 2002</TH>
      <TD class=tabletext>Critical</TD>
      <TD class=tabletext>Moderate</TD>
      <TD class=tabletext>None</TD></TR></TBODY></TABLE>The above <A 
  href="http://www.microsoft.com/technet/security/topics/rating.asp">assessment</A> 
  is based on the types of systems affected by the vulnerability, their typical 
  deployment patterns, and the effect that exploiting the vulnerability would 
  have on them. </P>
  <P><B>Vulnerability identifier:</B> <A 
  href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0692">CAN-2002-0692</A> 
  </P>
  <P><B>Tested Versions:</B><BR>Microsoft tested FrontPage Server Extensions 
  2000 and 2002 to assess whether they are affected by these vulnerabilities. 
  Previous versions are no longer <A 
  href="http://support.microsoft.com/directory/discontinue.asp">supported</A>, 
  and may or may not be affected by these vulnerabilities.</P></BLOCKQUOTE>
<P><FONT color=#003399 size=2><B>Frequently asked questions </B></FONT></P>
<BLOCKQUOTE>
  <P><B>What&#8217;s the scope of the vulnerability?</B></P>
  <P>This is a <A 
  href="http://www.microsoft.com/technet/security/bulletin/glossary.asp">denial 
  of service</A> and buffer overrun vulnerability. It affects FrontPage Server 
  Extensions 2000 and 2002 differently. With FrontPage Server Extensions 2000, 
  the flaw could cause most CPU availability to be consumed until the web 
  service is restarted. An attacker could use this vulnerability to conduct a 
  denial of service attack against an affected web server. With FrontPage Server 
  Extensions 2002, the same flaw in the interpreter causes a buffer overrun, 
  potentially allowing an attacker to run code of the his choice. </P>
  <P>Web site administrators who have used the <A 
  href="http://www.microsoft.com/technet/security/tools/locktool.asp">IIS 
  Lockdown Tool</A> to configure their servers as static web servers are already 
  protected against attacks that would attempt to exploit the vulnerability. 
</P>
  <P><B>What causes the vulnerability?</B></P>
  <P>The vulnerability results because of a flaw in the FrontPage Server 
  Extensions SmartHTML interpreter. The interpreter can enter a mode in which it 
  consumes all CPU availability on a web server using FrontPage Server 
  Extensions 2000 or can result in a buffer overrun in FrontPage Server 
  Extensions 2002, if it receives a request for a particular type of web file, 
  along with some specific parameters.</P>
  <P><B>What are the FrontPage Server Extensions?</B></P>
  <P><A 
  href="http://msdn.microsoft.com/library/en-us/dnservext/html/fpovrw.asp">FrontPage 
  Server Extensions</A> (FPSE) is a set of tools that can be installed on a 
  FrontPage-based web site. They serve two basic functions: to allow authorized 
  personnel to manage the server, add or change content, and perform other 
  tasks; and to add functions that are frequently used by web pages, such as 
  search and forms support. </P>
  <P>FPSE installs by default as part of IIS 4.0, 5.0 and 5.1. However, it can 
  be uninstalled if desired. Microsoft has long recommended that web 
  administrators uninstall FPSE if not needed. </P>
  <P><B>What is the SmartHTML interpreter?</B></P>
  <P>The SmartHTML interpreter, shtml.dll, is part of FPSE, and supports certain 
  types of dynamic web content. For instance, using SmartHTML, a web developer 
  can build a web page that relies on FrontPage features, but not actually have 
  those features embedded within the page until a user requests it.</P>
  <P>For example, a web developer might want to embed the current date and time 
  in a web page. In order to do that, the developer might use one of the WebBot 
  components that come with FrontPage. A WebBot component gives an author CGI 
  capabilities without writing CGI applications. The web page author inserts a 
  WebBot into an HTML page. What actually gets inserted is a specially formatted 
  HTML comment. A WebBot comment looks like a standard HTML comment with special 
  notation that identifies the WebBot and its properties. You set the property 
  values from a dialog box when the WebBot gets inserted. Each WebBot has its 
  own dialog. Microsoft calls the WebBot notation SmartHTML, and HTML pages 
  containing them SmartHTML pages. </P>
  <P>A WebBot is "executed" when the FrontPage Editor saves the HTML page. A 
  FrontPage Server Extension app scans the page for embedded WebBot components 
  and replaces them with standard HTML text. As a result of this scanning 
  process, a new page is created containing the standard HTML text generated 
  from the WebBot components and the web visitor sees the date and time rendered 
  on the web page.</P>
  <P><B>What&#8217;s wrong with the SmartHTML interpreter?</B></P>
  <P>If a request for a certain type of web file is made in a particular way, it 
  could have the effect on a web server using FrontPage Server Extensions 2000 
  of causing the SmartHTML interpreter to cycle endlessly, consuming all of the 
  server&#8217;s CPU availability and preventing the server from performing useful 
  work. On a web server using FrontPage Server Extensions 2002, this same type 
  of request could have the effect of causing a buffer overrun and potentially 
  allowing an attacker to run malicious code on that server.</P>
  <P><B>What could an attacker do via this vulnerability?</B></P>
  <P>In the case of FrontPage Server Extensions 2000, an attacker could use this 
  vulnerability to monopolize a server and prevent legitimate users from being 
  able to use the web server. In the case of FrontPage Server Extensions 2002, 
  an attacker could potentially cause a buffer overrun on the web server.</P>
  <P><B>How might an attacker exploit the vulnerability?</B></P>
  <P>The attack itself would only require that the attacker levy a particular 
  type of request on the SmartHTML interpreter. Upon attempting to process the 
  request (in the case of FrontPage Server Extensions 2000), the interpreter 
  would begin to "freewheel", and would continue to do so until the 
  administrator stopped and restarted the web service. In some cases, it might 
  be necessary to reboot the system in order to do this. In the case of 
  FrontPage Server Extensions 2002, the request could cause a buffer overrun in 
  the interpreter and allow code of the attacker&#8217;s choice to run in the context 
  of the interpreter.</P>
  <P><B>If an attacker exploited the buffer overrun in FrontPage Server 
  Extensions 2002, in what context would the hostile code run?</B></P>
  <P>In the case of the buffer overrun in FrontPage Server Extensions 2002, the 
  malicious code would run as system, even though getting to system would take a 
  convoluted exploit. Nonetheless, it is possible to that an attacker could 
  create such an exploit and be running as system.</P>
  <P><B>What steps could an administrator take to protect against the 
  vulnerability?</B></P>
  <P>Of course, the simplest way to eliminate the vulnerability is to install 
  the patch. But even if the patch were not installed, a server wouldn&#8217;t be at 
  risk if FPSE had been uninstalled, or if the SmartHTML interpreter were not in 
  use. For instance, the <A 
  href="http://www.microsoft.com/technet/security/tools/locktool.asp">IIS 
  Lockdown Tool</A>, if used to configure a static web server, disables the 
  interpreter.</P>
  <P><B>How does the patch eliminate the vulnerability?</B></P>
  <P>The patch causes the SmartHTML interpreter to reject the requests at issue 
  here, as they aren&#8217;t valid requests.</P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P>
  <P><B></B></P>
  <P></P></BLOCKQUOTE>
<H2>Patch availability</H2>
<BLOCKQUOTE><B>Download locations for this patch </B>
  <UL>
    <LI>Microsoft FrontPage Server Extensions 2002 for all platforms <A 
    href="http://download.microsoft.com/download/FrontPage2002/fpse1002/1/W98NT42KMeXP/EN-US/fps \
e1002.exe">http://download.microsoft.com/download/FrontPage2002/fpse1002/1/W98NT42KMeXP/EN-US/fpse1002.exe</A> \
  </LI>
    <LI>Microsoft FrontPage Server Extension 2000 for NT4 <A 
    href="http://download.microsoft.com/download/fp2000fd2000/Patch/1/W9XNT4Me/EN-US/fpse0901.ex \
e">http://download.microsoft.com/download/fp2000fd2000/Patch/1/W9XNT4Me/EN-US/fpse0901.exe</A>  \
</LI>  <LI>Microsoft FrontPage Server Extensions 2000 for Windows XP 
    <UL>
      <LI><A 
      href="http://www.microsoft.com/downloads/release.asp?ReleaseID=42995">http://www.microsoft.com/downloads/release.asp?ReleaseID=42995</A> \
  </LI>
      <LI><A href="http://windowsupdate.microsoft.com/">Windows Update</A> 
    </LI></UL></LI>
    <LI>Microsoft FrontPage Server Extensions 2000 for Windows 2000 
    <UL>
      <LI><A 
      href="http://www.microsoft.com/downloads/release.asp?ReleaseID=42954">http://www.microsoft.com/downloads/release.asp?ReleaseID=42954</A> \
  </LI>
      <LI><A href="http://windowsupdate.microsoft.com/">Windows Update</A> 
    </LI></UL></LI></UL></BLOCKQUOTE>
<P><FONT color=#003399 size=2><B>Additional information about this 
patch</B></FONT> </P>
<BLOCKQUOTE><B>Installation platforms: </B><BR>This patch can be installed on: 

  <UL>
    <LI><B>FrontPage Server Extensions 2002</B>: The patch can be applied on all 
    platforms which support FrontPage Server Extensions 2002. </LI>
    <LI><B>FrontPage Server Extensions 2000</B>: The patches can be applied on 
    the following systems running FrontPage Server Extensions 2000 - Windows XP, 
    Windows 2000, and NT4. </LI></UL>
  <P><B>Inclusion in future service packs:</B><BR>The fix for this issue will be 
  included in Windows 2000 SP4, Windows XP SP2 and any future service packs for 
  FPSE 2002. </P>
  <P><B>Reboot needed:</B> Yes </P>
  <P><B>Patch can be uninstalled:</B><BR></P>
  <UL>
    <LI>FrontPage Server Extensions 2000 patches on Windows 2000 and Windows XP 
    can be uninstalled. </LI>
    <LI>FrontPage Server Extensions 2000 patches for NT4 cannot be uninstalled. 
    </LI>
    <LI>FrontPage Server Extensions 2002 patches cannot be uninstalled. </LI></UL>
  <P><B>Superseded patches:</B> None. </P>
  <P><B>Verifying patch installation:</B> </P>
  <UL>
    <LI>Users who are applying the patch on Windows 2000 or Windows XP should 
    refer to <A 
    href="http://support.microsoft.com/default.aspx?scid=kb;en-us;Q324096">Q324096</A> 
    </LI>
    <LI>Users who are applying the patch for FrontPage Server Extensions 2000 
    please refer to Knoweldege Base article <A 
    href="http://support.microsoft.com/default.aspx?scid=kb;en-us;Q329085">Q329085</A> 
    </LI>
    <LI>Users who are applying the patch for FrontPage Server Extensions 2002 
    please refer to Knoweldege Base article <A 
    href="http://support.microsoft.com/default.aspx?scid=kb;en-us;Q329086">Q329086</A> 
    </LI></UL>
  <P><B>Caveats:</B><BR>Users running FrontPage Server Extensions 2002 on any 
  supported platform who have not applied the latest update will need to apply 
  the update before installing this patch. To learn more about the update, 
  please read <A 
  href="http://support.microsoft.com/default.aspx?scid=kb;en-us;Q317296">Q317296</A>. 
  To go directly to the FrontPage Server Extensions 2002 Update, click <A 
  href="http://download.microsoft.com/download/FrontPage2002/fpse1001/1/W98NT42KMeXP/EN-US/fpse1001.exe">here</A>. \
  </P>
  <P><B>Localization:</B><BR>Localized versions of this patch are available at 
  the locations discussed in "Patch Availability". </P>
  <P><B>Obtaining other security patches: </B><BR>Patches for other security 
  issues are available from the following locations: </P>
  <UL>
    <LI>Security patches are available from the <A 
    href="http://www.microsoft.com/downloads/search.asp?Search=Keyword&amp;Value=%27security_patch%27&amp;OpSysID=1">Microsoft \
  Download Center</A>, and can be most easily found by doing a keyword search 
    for "security_patch". </LI>
    <LI>Patches for consumer platforms are available from the <A 
    href="http://windowsupdate.microsoft.com/">WindowsUpdate</A> web site 
  </LI></UL></BLOCKQUOTE>
<H2>Other information: </H2>
<BLOCKQUOTE><B>Acknowledgments</B>
  <P>Microsoft <A 
  href="http://www.microsoft.com/technet/security/bulletin/policy.asp">thanks 
  </A>&nbsp;Maninder Bharadwaj of Digital Defense Services part of Digital 
  GlobalSoft Ltd. for reporting this issue to us and working with us to protect 
  customers. </P>
  <P><B>Support: </B></P>
  <UL>
    <LI>Microsoft Knowledge Base article Q324096 discusses this issue and will 
    be available approximately 24 hours after the release of this bulletin. 
    Knowledge Base articles can be found on the <A 
    href="http://support.microsoft.com/?scid=fh;en-us;kbhowto">Microsoft Online 
    Support</A> web site. </LI>
    <LI>Technical support is available from <A 
    href="http://support.microsoft.com/directory/question.asp?sd=gn&amp;fr=0">Microsoft 
    Product Support Services</A>. There is no charge for support calls 
    associated with security patches. </LI></UL>
  <P><B>Security Resources: </B>The <A 
  href="http://www.microsoft.com/technet/security/default.asp">Microsoft TechNet 
  Security</A> Web Site provides additional information about security in 
  Microsoft products. </P></BLOCKQUOTE>
<DIV><STRONG><FONT size=4>Exploit: </FONT></STRONG></DIV>
<DIV>The exploit could be provided for research and educational purposes on 
request. <BR><BR><FONT face=Arial color=#0000ff size=2>Regards,</FONT></DIV>
<P><FONT size=2>-------------------------------------------------<BR>Maninder 
Bharadwaj<BR>Senior Security Specialist- Digital Defense Services<BR>Digital 
GlobalSoft Ltd.<BR>(A subsidiary of Hewlett-Packard Co., USA)<BR>Digital Park, 
Plot No. 39/40, Electronic City<BR>Hosur Road, Bangalore - 561 
229<BR>-------------------------------------------------<BR>Tel: +91 80 8528395 
Ext 12171<BR>Fax: +91 80 8528420<BR>Email: 
maninder.bharadwaj@digital.com<BR>Web:&nbsp; 
www.digitalglobalsoft.com<BR></FONT></P></BODY></HTML>


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic