RE: Microsoft Security Bulletin MS03-028: Flaw in ISA S erver Error Pages Could Allow Cross-Site Scripting Attack (Q816456)

  • From: "Rogers, Brian" <RogersB@xxxxxxxxxxxxxx>
  • To: "'[ISAserver.org Discussion List]'" <isalist@xxxxxxxxxxxxx>
  • Date: Wed, 16 Jul 2003 18:30:24 -0400

Love how that fix doesn't bother to tell you its going to stop all your
services as soon as you accept the EULA.

Nice little tidbit of information id like to have prior to it happening.



-----Original Message-----
From: Greg Mulholland [mailto:gmulholland@xxxxxxxxxxxxxxx] 
Sent: Wednesday, July 16, 2003 5:45 PM
To: [ISAserver.org Discussion List]
Subject: [isalist] Microsoft Security Bulletin MS03-028: Flaw in ISA Server
Error Pages Could Allow Cross-Site Scripting Attack (Q816456)

http://www.ISAserver.org



- - ---------------------------------------------------------------
Title:      Flaw in ISA Server Error Pages Could Allow Cross-Site 
            Scripting Attack (816456)
Date:       16 July 2003
Software:   Microsoft(r) ISA Server        
Max Risk:   Important
Bulletin:   MS03-028

Microsoft encourages customers to review the Security Bulletins         
at: 
http://www.microsoft.com/technet/security/bulletin/MS03-028.asp
http://www.microsoft.com/security/security_bulletins/ms03-028.asp
- - ---------------------------------------------------------------

Issue:
======

ISA Server contains a number of HTML-based error pages that allow 
the server to respond to a client requesting a Web resource with 
a customized error. A cross-site scripting vulnerability exists 
in many of these error pages that are returned by ISA Server 
under specific error conditions.

To exploit this flaw, an attacker would have to first be aware of 
a specific ISA server and its access policies or host an ISA 
server of their own and create specific access policies designed 
to exploit this vulnerability. The attacker could then craft a 
request to trigger a page refusal. Once the attack was crafted, 
the attacker would have to host a Web site containing the link, 
or send the link to the user in the form of an HTML e-mail. After 
the user previewed or opened the e-mail, the malicious site could 
be visited automatically without further user interaction. In the 
Web-based attack scenario, an attacker would have no way to force 
a user to visit the Web site. 

Mitigating factors: 
====================

 - The vulnerability could only be exploited if the attacker 
could entice another user into visiting a Web page and clicking a 
link on it, or opening an HTML-based e-mail.
 
 - The request must be one that would cause the ISA server to 
respond with one of several affected error pages. 

 - The vulnerability would not normally enable an attacker to 
gain any privileges on an affected ISA Server computer, breach 
the firewall, or compromise any cached content, unless the user 
is operating on the ISA server itself and is using the Web Proxy 
service to access the Internet. 

Risk Rating:
============
Important

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read 
the  Security Bulletins at
   
http://www.microsoft.com/technet/security/bulletin/ms03-028.asp
http://www.microsoft.com/security/security_bulletins/ms03-028.asp
   
   for information on obtaining this patch.


- - ---------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS 
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT 
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING 
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS 
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, 
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL 
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN 
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT 
ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL 
OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPxSXqo0ZSRQxA/UrAQG5Vgf/a1jJ6VjZr9jPU+5V6Ku1KwFdKtb0yxzj
VY0f/ol6ooJCT8POwD71QRcNeuOug1veF1ZvDSjT6Q0E51KbV63P5/9Wnjvx+tyi
bIN6CMeLfxDwyHYI7V/PdCHp0TEQ8viOd4o2KVYBvvULz/BiQfEhqpfz8ifVCP4+
5t0ocoo0mdWE6oy9UDcFSZ4YEkFBozgHjAGUlyXqUz1xurgeS/vND65IUi5raS7R
LJ5Wl8KzgSKLc/dXor4DDdNVyue9b94FfcrbUETpEWAk6rP8acH8vFLfQHcDuFku
RR9exHREliszSt9sGTzyMIFJxq+4MZzmgEqzk/YJP+P+NakxzcZLjw==
=zf03
-----END PGP SIGNATURE-----



*******************************************************************

You have received this e-mail bulletin because of your subscription to the
Microsoft Product Security Notification Service.  For more information on
this service, please visit
http://www.microsoft.com/technet/security/notify.asp.
 
To verify the digital signature on this bulletin, please download our PGP
key at http://www.microsoft.com/technet/security/notify.asp.
 
To unsubscribe from the Microsoft Security Notification Service, please
visit the Microsoft Profile Center at
http://register.microsoft.com/regsys/pic.asp 
 
If you do not wish to use Microsoft Passport, you can unsubscribe from the
Microsoft Security Notification Service via email as described below:
Reply to this message with the word UNSUBSCRIBE in the Subject line.
 
For security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.


------------------------------------------------------
List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ
------------------------------------------------------
Other Internet Software Marketing Sites:
Leading Network Software Directory: http://www.serverfiles.com
No.1 Exchange Server Resource Site: http://www.msexchange.org
Windows Security Resource Site: http://www.windowsecurity.com/
Network Security Library: http://www.secinf.net/
Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com
------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
rogersb@xxxxxxxxxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub')

Other related posts:

  • » RE: Microsoft Security Bulletin MS03-028: Flaw in ISA S erver Error Pages Could Allow Cross-Site Scripting Attack (Q816456)