[VulnWatch] ISA Server 2004 Log Manipulation
- From: beSIRT <beSIRT@xxxxxxxxxxxxxxxxxx>
- Date: Thu, 4 May 2006 16:28:40 +0300
Discovered by: Noam Rathaus using the beSTORM fuzzer.
Reported to vendor: December, 2005.
Vendor response: Microsoft does not consider this issue to be a security
Public release date: 4th of May, 2006.
There is a Log Manipulation vulnerability in Microsoft ISA Server 2004, which
when exploited will enable a malicious user to manipulate the Destination
Host parameter of the log file.
By sending the following request to the server:
GET / HTTP/1.0
We were able to insert arbitrary characters, in this case the ASCII characters
1, 2, 3 (respectively) into the Destination Host parameter of the log file.
This has been found after 3 days of running the beSTORM fuzzer at 600+
Sessions per Second while monitoring the ISA Server log file for problems.
About ISA Server 2004
"Microsoft Internet Security and Acceleration (ISA) Server 2004 is the
advanced stateful packet and application-layer inspection firewall, virtual
private network (VPN), and Web cache solution that enables enterprise
customers to easily maximize existing information technology (IT) investments
by improving network security and performance."
Product URL: http://www.microsoft.com/isaserver/default.mspx
beSIRT - Beyond Security's Incident Response Team
- Prev by Date: [VulnWatch] BankTown's ActiveX Buffer Overflow Vulnerability
- Next by Date: [VulnWatch] Cisco Security Advisory: AVS TCP Relay Vulnerability
- Previous by thread: [VulnWatch] BankTown's ActiveX Buffer Overflow Vulnerability
- Next by thread: [VulnWatch] Cisco Security Advisory: AVS TCP Relay Vulnerability