Public exploits available
On this page
A remote code execution vulnerability exists on Windows systems running Microsoft Internet Information Services (IIS) with the Windows Internet Printing service enabled. This issue could allow a remote, authenticated attacker to execute arbitrary code on an affected system.
An attacker who successfully exploited this vulnerability could run arbitrary code on a user’s system with system privileges. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts.
Technical details (analysis)
The Internet Printing Protocol (IPP) function is implemented as an ISAPI extension for IIS. There exists a remote, authenticated vulnerability in the Microsoft implementation of IPP on Windows servers running IIS. An integer overflow exists in the IPP implementation that could allow an authenticated attacker to perform remote code execution on affected IIS servers. An attacker could send a specially crafted HTTP POST request to a vulnerable web server that would cause the server to connect to a machine controlled by the attacker acting as a printer using IPP. The attacker would then use specially crafted responses to perform remote code execution on the target server.
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista and Windows Vista Service Pack 1
Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for x64-based Systems
Windows Server 2008 for Itanium-based Systems
All applications not on the affected list.
Release Date: 2008-10-14T00:00:00
Known false positives
No known false positives at this time
Disable the IPP Service
Run the IIS Lockdown Tool 2.1