Security Incidents mailing list archives
Re: Possible way to avoid unknown IIS vulnerabilities
From: "Mike Lewinski" <mike () rockynet com>
Date: Fri, 10 Aug 2001 09:01:03 -0600
"Michael Katz" <mike () responsible com> wrote:
Using host headers on IIS servers will likely protect you from more than 90% of the attacks that are currently circulating, as most of them rely on scanning and exploitation via http://yourIPaddress. This is particularly true for Code Red v1 and v2, the sadmind/IIS worm, the new Code Red II worm and the common scripted scans for decoding vulnerabilities. However, you should take the following into consideration:
An additional limitation is that some older browsers don't send host headers. That means they can't see your sites, but then again anyone still running a 2.0 browser won't see much of the web anyway. If this method is used, I'd still define a default web site for the IP and take a few additional actions: 1) Restrict anonymous access to the default web to local admin only 2) Restrict access to the default web by IP address to 127.0.0.1 only 3) Remove all permissions from the site (no read, script, exec) 4) Set directory ACL's to no access for all but admin 5) Stop the default web in the MMC It may be overkill, but makes it less likely another admin will come along and "fix" it. Mike ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Possible way to avoid unknown IIS vulnerabilities Mark A Lewis (Aug 09)
- RE: Possible way to avoid unknown IIS vulnerabilities Michael Katz (Aug 10)
- Re: Possible way to avoid unknown IIS vulnerabilities Mike Lewinski (Aug 10)
- RE: Possible way to avoid unknown IIS vulnerabilities Michael Katz (Aug 10)
