{"vuid":"VU#113716","idnumber":"113716","name":"Microsoft Windows Media Services contains buffer overflow in \"nsiislog.dll\"","keywords":["Microsoft","Windows Media Services","nsiislog.dll","incoming client requests","Q822343","MS03-022","buffer overflow"],"overview":"Microsoft Windows Media Services provides streaming audio and video capabilities. A vulnerability in a component of this software could allow a remote attacker to compromise the server running it.","clean_desc":"According to Microsoft Security Bulletin MS03-022: Microsoft Windows Media Services is a feature of Microsoft Windows 2000 Server, Advanced Server, and Datacenter Server and is also available in a downloadable version for Windows NT 4.0 Server. Windows Media Services contains support for a method of delivering media content to clients across a network known as multicast streaming. In multicast streaming, the server has no connection to or knowledge of the clients that may be receiving the stream of media content coming from the server. To facilitate logging of client information for the server, Windows 2000 includes a capability specifically designed to enable logging for multicast transmissions. This logging capability is implemented as an Internet Services Application Programming Interface (ISAPI) extension nsiislog.dll. When Windows Media Services are added through add/remove programs to Windows 2000, nsiislog.dll is installed in the Internet Information Services (IIS) Scripts directory on the server. Once Windows Media Services is installed, nsiislog.dll is automatically loaded and used by IIS. A buffer overflow flaw exists in the way that nsiislog.dll processes incoming client requests. This flaw results in a vulnerability because an attacker could send the server a maliciously crafted HTTP request that could execute code on the vulnerable server or could cause IIS to fail. This vulnerability is not believed to immediately affect servers running Windows Media Services as a stand-alone service outside the context of IIS. Since the nsiislog.dll file is not available as an ISAPI extension in this environment, an attacker would not be able to supply data to it in a way that exploits the buffer overflow error. The CERT/CC still encourages sites employing this configuration to apply the remediation steps described below in order to mitigate other potential exploitation vectors.","impact":"A remote attacker may be able to execute arbitrary code in the context of the account under which IIS was running. This access could be leveraged by the attacker to take any action on the system.","resolution":"Microsoft has released patches for this issue. Users are encouraged to review Microsoft Security Bulletin MS03-022 for more information.","workarounds":"Workarounds If nsiislog.dll is being used as an ISAPI extension to IIS and its functionality is not required, sites are encouraged to unmap the extension.","sysaffected":"","thanks":"This issue was discovered, researched, and reported to Microsoft by Brett Moore of Security-Assessment.com.","author":"This document was written by Chad R Dougherty.","public":["http://www.microsoft.com/technet/security/bulletin/MS03-022.asp","http://www.microsoft.com/security/security_bulletins/ms03-022.asp","http://support.microsoft.com/default.aspx?scid=kb;en-us;822343","http://www.secunia.com/advisories/9115/","http://securitytracker.com/alerts/2003/Jun/1007059.html"],"cveids":["CVE-2003-0349"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-06-25T17:41:36Z","publicdate":"2003-06-25T00:00:00Z","datefirstpublished":"2003-07-31T13:38:19Z","dateupdated":"2003-07-31T13:38:24Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"16","cam_exploitation":"1","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"19","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"19.2375","cam_scorecurrentwidelyknown":"22.0875","cam_scorecurrentwidelyknownexploited":"35.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":19.2375,"vulnote":null}