Home page logo

bugtraq logo Bugtraq mailing list archives

Windows 2000 .printer remote overflow proof of concept exploit
From: Marc Maiffret <marc () EEYE COM>
Date: Wed, 2 May 2001 12:54:45 -0700

We have updated our advisory
(http://www.eeye.com/html/Research/Advisories/AD20010501.html) to link to a
proof of concept exploit for our Windows 2000 .printer ISAPI overflow
vulnerability. The proof of concept code, when run against a vulnerable
Win2k system, will create a file called www.eEye.com.txt on the root of
drive c.

If you have a Windows 2000 web server then please install the Microsoft
security patch ASAP. This proof of concept exploit is not to be used as a
method of testing to see if your vulnerable or not. It has been published as
a way to learn more about what is going on with specific technical details
pertaining to this flaw. If you have not installed the Microsoft security
patch then you are most likely vulnerable and need to patch your system

As a side note... eEye Digital Security was contacted by a few of the rather
lage IDS vendors yesterday looking to get a copy of the example exploit so
that they could create a signature for their IDS. Instead of replying to
each of them individualy we thought we would do so here and that way other
IDS vendors will have the "heads up."

Creating an IDS signature that looks for a request of GET /NULL.printer
HTTP/1.0\nHost: eeyeoverflowstring\n\n is not going to really do much for
you. While you might catch our specific example exploit you will miss any
other exploits that have been developed and are "in the wild." In order to
correctly monitor for people launching attacks against the .printer ISAPI
filter you should be looking for any get requests of .printer and a large
(you'll have to track down the buffer range yourself, around 420) Host:
header. That is one of the ways that SecureIIS is able to generically stop
the attack (simply speaking of course).

Anyways, have fun reading and learning from the example exploit. Ryan Permeh
(ryan () eeye com) has done a great job with it.

Also... There has been some talk on various mailing lists about methods of
detecting if the .printer ISAPI filter is installed on a remote server. Now
some people suggested opening IE and then typing in
http://www.example.com/anything.printer which should then return an error
like "Error in web printer install." However by default IE shows "friendly"
HTTP error messages and is not going to show you the ISAPI error message. So
either turn off friendly HTTP error messages or use telnet (recommended).

Marc Maiffret
Chief Hacking Officer
eEye Digital Security
http://eEye.com/Retina - Network Security Scanner
http://eEye.com/Iris - Network Traffic Analyzer
http://eEye.com/SecureIIS - Web Application Firewall

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]