|
john carr
--------------------------------------------
IIS 5 Web Server Compromises
added June 24
US-CERT is aware of new activity affecting compromised web sites running
Microsoft's Internet Information Server (IIS) 5 and possibly end-user
systems that visit these sites. Compromised sites are appending
JavaScript to the bottom of web pages. When executed, this JavaScript
attempts to access a file hosted on another server. This file may
contain malicious code that can affect the end-user's system. US-CERT is
investigating the origin of the IIS 5 compromises and the impact of the
code that is downloaded to end-user systems.
Web server administrators running IIS 5 should verify that there is no
unusual JavaScript appended to the bottom of pages delivered by their
web server.
This activity is another example of why end users must exercise caution
when JavaScript is enabled in their web browser. Disabling JavaScript
will prevent this activity from affecting an end-user's system, but may
also degrade the appearance and functionality of some web sites that
rely upon JavaScript. US-CERT recommends that end-users disable
JavaScript unless it is absolutely necessary. Users should be aware that
any web site, even those that may be trusted by the user, may be
affected by this activity and thus contain potentially malicious code.
From: United States Computer Emergency Readiness Team out of Carnegie
Mellon University
Here's the Microsoft response so far:
What You Should Know About Download.Ject
Published: June 24, 2004 | Updated June 25, 2004 12:35 A.M. Pacific
Time
Microsoft teams are investigating a report of a security issue
affecting customers using Microsoft Internet Information Services 5.0
(IIS) and Microsoft Internet Explorer, components of Windows.
Important Customers who have deployed Windows XP Service Pack 2
RC2 are not at risk.
Reports indicate that Web servers running Windows 2000 Server and IIS
that have not applied update 835732, which was addressed by Microsoft
Security Bulletin MS04-011, are possibly being compromised and being
used to attempt to infect users of Internet Explorer with malicious
code.
The MS04-011 patch was issued in April, 2004, and the current version of
IIS is 6.0. Apparently this trojan affects an old version of the software
if the administrator has failed to patch the old version properly.
Trojan programs are old hat but this one is more dangerous because it's
harder to detect and doesn't do anything obvious to let you know it's there
- it does use specific port numbers where you can check for activity
though. It's probable intent is to steal ids, passwords, account numbers
and the like and send them back to someplace on the internet.
If you're interested in reading about this kind of thing, try visiting
http://www.us-cert.gov/current/current_activity.html for less impassioned,
more objective and certainly less self-serving information.
Just the facts, ma'am.
"The FUD Buster"
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.