IIS Execution File Text Can Be Viewed in Client

ID: Q164059


The information in this article applies to:
  • Microsoft Internet Information Server versions 2.0, 3.0


SYMPTOMS

NOTE: On Sunday, February 23, 1997, Microsoft was alerted to a posting regarding an Internet Information Server (IIS) security exposure. This bug permits the publication of IIS executable files via a complicated string of commands sent from a web browser to an IIS server.

Because of this security exposure, Internet users can view Active Server Pages (ASP), Internet Server API applications (ISAPI), Internet Database Connector (IDC) applications, or Common Gateway Interface (CGI) applications within an IIS publication installation.


RESOLUTION

Get the hotfix mentioned below.

This hotfix has been posted to the following Internet location. You can download any of these self-extracting files from the following service:


   Internet (anonymous FTP)
   ftp ftp.microsoft.com
   Change to the bussys/winnt/winnt-public/fixes/usa/ 
   nt40/hotfixes-postSP2/iis-fix/ folder.
   Get Readme.1st (for instructions on downloading and installing the
   hotfix). 

Or use the following full URL on your client browser:

   FTP://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/ 
   nt40/hotfixes-postSP2/iis-fix/readme.1st 


STATUS

Microsoft has confirmed this to be a problem in Microsoft Internet Information Server versions 2.0 and 3.0.



A supported fix is now available, but has not been fully regression-tested and should be applied only to systems experiencing this specific problem. Unless you are severely impacted by this specific problem, Microsoft recommends that you wait for the next Service Pack that contains this fix. Contact Microsoft Technical Support for more information.


Keywords : kbusage iissecurity iiswww iisapi
Version : 2.0 3.0
Platform : NT WINDOWS
Issue type :


Last Reviewed: April 27, 1999
© 2000 Microsoft Corporation. All rights reserved. Terms of Use.