Menu
Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

An exploit for a zero-day vulnerability in Microsoft IIS 6.0 was published online, increasing the risk of attacks

IDG

IDG

A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported but still widely used.

The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support for this version of IIS ended in July 2015 along with support for its parent product, Windows Server 2003.

Even so, independent web server surveys suggest that IIS 6.0 still powers millions of public websites. In addition, many companies might still run web applications on Windows Server 2003 and IIS 6.0 inside their corporate networks, so this vulnerability could help attackers perform lateral movement if they access such networks through other means.

There's evidence that this IIS vulnerability has been known by a limited number of attackers since at least July or August of last year. However, the publishing earlier this week of an exploit for it on GitHub makes it accessible to a larger number of hackers.

"Other threat actors are now in the stages of creating malicious code based on the original proof-of-concept (PoC) code," researchers from Trend Micro said in a blog post Wednesday.

According to the exploit's authors, the vulnerability is a buffer overflow in the ScStoragePathFromUrl function of the IIS 6.0 WebDAV service. It can be exploited through a specially crafted PROPFIND request.

Web Distributed Authoring and Versioning (WebDAV) is an extension of the standard Hypertext Transfer Protocol (HTTP) that allows users to create, change and move documents on a server. The extension supports several request methods, including PROPFIND, which is used to retrieve the properties of a resource.

Since Microsoft won't patch this vulnerability, one possible mitigation is to disable the WebDAV service on IIS 6.0 installations. Security firm ACROS Security has also developed a free "micropatch" for this vulnerability -- an unofficial patch that can be applied without restarting the affected server or even IIS process.

However, the best course of action would be to migrate affected websites to a newer IIS and Windows Server version altogether, as there are probably other vulnerabilities out there that also affect this platform and won't get patched.

A March survey by web analytics firm Netcraft revealed that around 185 million websites are still hosted on over 300,000 web servers that run Windows Server 2003.


Follow Us

Join the newsletter!

Error: Please check your email address.

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments