# This is a template for submitting snort signature descriptions to
# the snort.org website
#
# Ensure that your descriptions are your own
# and not the work of others.  References in the rules themselves
# should be used for linking to other's work. 
#
# If you are unsure of some part of a rule, use that as a commentary
# and someone else perhaps will be able to fix it.
# 
# $Id: 967.txt,v 1.1 2002/08/08 01:46:22 cazz Exp $
#
# 

Rule:
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS 80(msg:"WEB-FRONTPAGE dvwssr.dll access"; flow:to_server; flags: A+; uricontent: "/dvwssr.dll"; nocase; reference:bugtraq,1108; reference:cve,CVE-2000-0260; reference:arachnids,271; reference:url,www.microsoft.com/technet/security/bulletin/ms00-025.asp; classtype:web-application-activity; sid:967; rev:4;) 

--

Sid:  
967
--

Summary:  
dvwssr.dll is a component installed with Windows NT Option Pack 4.0, Personal Web Server for Windows 95 and 98 and Front Page 98 Server Extensions. This component is vulnerable to a buffer overflow which would run in the context of the system account.

--
Impact:  
Possible denial of service or system compromise.

--
Detailed Information:  
As with an abundance of other exploits related to Microsofts Internet Information Services and web server based implementations, it would be possible for an attacker to run code of choice against the vulnerable web server.  It is also possible to use this exploit to stop the remote server from responding which would result in a denial of service.

--
Attack Scenarios:  
   

--
Ease of Attack:  
This attack would require for both the dvwssr.dll file to reside on the web server and for the correct permissions to be in place in order for the attack to be successful.  Using a script to send continued requests for the file dvwssr.dll would make a denial of service attack fairly easy.

--
False Positives:  
Web requests or web based applications which use dvwssr.dll in a context which in not malicious in nature.

--
False Negatives:

--
Corrective Action:  
Remove dvwssr.dll from the web server and test all necessary functionality.  See additional references for more information.

--
Contributors:

Chris Arsenault	carsenault@firstedcu.org	Intitial Research
Josh Gray	Edits

Additional References:

Security Focus BugTraq ID
http://www.securityfocus.com/bid/1109

CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0260

Microsoft  ms00-025
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms00-025.asp
 
