exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

asb00-11.iis.imagemap

asb00-11.iis.imagemap
Posted Jul 1, 2000
Site allaire.com

Allaire Security Bulletin (ASB00-11) - A procedure is available to eliminate a security vulnerability affecting several web server products. The vulnerability could potentially allow a malicious web site visitor to perform actions that the system permissions authorize him to perform, but which he previously may have had no means of actually carrying out. This is not a problem with ColdFusion Server itself, but it is an issue that can affect ColdFusion users. Allaire recommends that customers follow the instructions posted on the Microsoft Web site to address this issue.

tags | web
SHA-256 | ead49691ad21715e0cc247f3d78fe35d2479b62c76bd26d3dc1a257cf8f8a048

asb00-11.iis.imagemap

Change Mirror Download
Allaire Security Bulletin (ASB00-11)
Microsoft: Procedure Available to Eliminate "Server-Side Image Map Components"
Vulnerability

Originally Posted: May 8, 2000
Last Updated: May 8, 2000

Summary

A procedure is available to eliminate a security vulnerability affecting several web server
products. The vulnerability could potentially allow a malicious web site visitor to perform actions
that the system permissions authorize him to perform, but which he previously may have had
no means of actually carrying out. This is not a problem with ColdFusion Server itself, but it is
an issue that can affect ColdFusion users. Allaire recommends that customers follow the
instructions posted on the Microsoft Web site to address this issue.

Issue

This issue is clearly explained in the Microsoft Security Bulletin: "The FrontPage 97 and 98
Server Extensions include two components, Htimage.exe and Imagemap.exe, that provide
CERN- and NCSA-compliant server side image mapping support, respectively, for legacy
browsers. Both components contain unchecked buffers that could be used to run arbitrary
code. Although part of the Server Extensions, these components also install as part of several
other web server products."

Further: "The risk posed by this vulnerability is significantly restricted by the fact that the
affected components run "out of process" and in the security context of the user. Thus, there is
no capability through this vulnerability to cause either the web service or the server itself to
crash, nor is there an opportunity to run code in an elevated security context. However, it still
could be possible for a malicious user to perform actions that, though permitted, he would
otherwise be unable to take because the functionality was not exposed via a web page or
script."

Affected Software Versions

FrontPage 97 Server Extensions, which ship as part of FrontPage 97
FrontPage 98 Server Extensions, which ship as part of FrontPage 98
Microsoft(r) Windows NT(r) 4.0 Option Pack, which is the primary distribution
mechanism for Internet Information Server 4.0
Personal Web Server 4.0, which ships as part of Windows(r) 95 and 98

What Allaire is Doing

This is not an Allaire product. We are recommending that customers reference the information
at Microsoft's site to address this issue.

What Customers Should Do

There is a patch available to correct this problem. It is detailed in the following Microsoft
Security Bulletin (MS00-028):

http://www.microsoft.com/technet/security/bulletin/ms00-028.asp

Please note: this issue and patch may not be required for all users. Allaire customers
should review all material in the Microsoft Security Bulletin and related documents
carefully before applying the patch. As always, customers should test patch changes in
a testing environment before modifying production servers.

Revisions
May 8, 2000 -- Bulletin first created.

Reporting Security Issues
Allaire is committed to addressing security issues and providing customers with the information
on how they can protect themselves. If you identify what you believe may be a security issue
with an Allaire product, please send an email to secure@allaire.com. We will work to
appropriately address and communicate the issue.

Receiving Security Bulletins
When Allaire becomes aware of a security issue that we believe significantly affects our products
or customers, we will notify customers when appropriate. Typically this notification will be in the
form of a security bulletin explaining the issue and the response. Allaire customers who would
like to receive notification of new security bulletins when they are released can sign up for our
security notification service.

For additional information on security issues at Allaire, please visit the Security Zone at:
http://www.allaire.com/security

THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF
ANY KIND. ALLAIRE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL
ALLAIRE CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING
DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF ALLAIRE CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close