发布时间 :1999-08-11 00:00:00
修订时间 :2008-09-09 00:00:00

[原文]Denial of service in IIS 4.0 via a flood of HTTP requests with malformed headers.

[CNNVD]NT IIS错误HTTP请求头DoS漏洞(CNNVD-199908-018)

        IIS 4.0存在漏洞,通过错误头HTTP请求可以造成服务拒绝。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:site_server:3.0:unknown:commerceMicrosoft site_server 3.0 Commerce Edition
cpe:/a:microsoft:commercial_internet_system:2.0Microsoft commercial_internet_system 2.0
cpe:/a:microsoft:internet_information_server:4.0Microsoft IIS 4.0
cpe:/a:microsoft:commercial_internet_system:2.5Microsoft commercial_internet_system 2.5

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  MS  MS99-029
(UNKNOWN)  CIAC  J-058;%5BLN%5D;Q238349
(UNKNOWN)  MSKB  Q238349

- 漏洞信息

中危 其他
1999-08-11 00:00:00 2005-05-02 00:00:00
        IIS 4.0存在漏洞,通过错误头HTTP请求可以造成服务拒绝。

- 公告与补丁

        Microsoft released a patch for this vulnerability on August 11, 1999. However, on August 12, 1999 they retracted it due to an error that made IIS hang whenever the logfile was an exact multiple of 64KB. Microsoft re-released the bulletin on August 16, 1999. The new patches are available at:

- 漏洞信息 (19457)

Ms Commercial Internet System 2.0/2.5,IIS 4.0,Site Server Commerce Edition 3.0 alpha/3.0 DoS (EDBID:19457)
multiple dos
1999-08-11 Verified
0 Nobuo Miwa
N/A [点击下载]
Microsoft Commercial Internet System 2.0/2.5,IIS 4.0,Site Server Commerce Edition 3.0 alpha/3.0 i386 Malformed HTTP Request Header DoS


Microsoft IIS and all other products that use the IIS web engine have a vulnerability whereby a flood of specially formed HTTP request headers will make IIS consume all available memory on the server and then hang. IIS activity will be halted until the flood ceases or the service is stopped and restarted. 

Simple play. I sent lots of "Host:aaaaa...aa" to IIS like...

GET / HTTP/1.1
Host: aaaaaaaaaaaaaaaaaaaaaaa....(200 bytes)
Host: aaaaaaaaaaaaaaaaaaaaaaa....(200 bytes)
...10,000 lines
Host: aaaaaaaaaaaaaaaaaaaaaaa....(200 bytes)

I sent twice above request sets. Then somehow victim IIS got memory leak after these requests. Of course, it can not respond any request any more. If you try this, you should see memory increase through performance monitor. You would see memory increase even after those requests finished already. It will stop when you got shortage of virtual memory. After that, you might not be able to restart web service and you would restart computer. I tried this against Japanese and English version of Windows NT. 		

- 漏洞信息

Microsoft IIS Malformed HTTP Request Header DoS
Remote / Network Access Denial of Service
Loss of Availability Patch / RCS
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

1999-08-11 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

  • Exploit Database: 19457
  • CVE ID: 1999-0867 (see also: NVD)
  • ISS X-Force ID: 3115
  • Bugtraq ID: 579
  • CIAC Advisory: j-058
  • Microsoft Knowledge Base Article: Q238349

- 漏洞作者

Unknown or Incomplete