Short Name |
HTTP:FRONTPAGE:DOS-NAME-DOS |
---|---|
Severity |
Minor |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Frontpage MS-DOS Device Name DoS |
Release Date |
2004/12/08 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Microsoft Frontpage. Attackers can send a malformed request with an MS-DOS device name to shtml.exe to crash the server.
It is possible to remotely crash a system running Microsoft FrontPage Server Extensions by conducting a URL request for a MS-DOS device through shtml.exe. For example, the following URL requests will crash FrontPage Server Extensions: http://target/_vti_bin/shtml.exe/comX.htm (X being one of 1, 2 ,3, or 4; the device must exist on the target machine) http://target/_vti_bin/shtml.exe/prn.htm http://target/_vti_bin/shtml.exe/aux.htm The device name must have an appended extension in order for the exploit to work. In addition to the HTM extension, ASP will work as well. Restarting IIS or rebooting the system is required in order to regain normal functionality. Testing has shown that it may require a constant stream of these requests in order to render the server ineffective.