Korean
<< Back
VID 22013
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The ActivePerl in the IIS web server is vulnerable to a buffer overflow vulnerability. An attacker can run arbitrary code on the web server.
ActivePerl is an implementation of the Perl scripting language for Microsoft Windows systems developed by Activestate. ActivePerl allows for high-performance integration with IIS using a DLL called 'perlIIS.dll' to handle a '.plx' ISAPI extension.
perlIIS.dll contains a remotely exploitable buffer overflow vulnerability in handling of the URL string. It is due to an unbounded string copy operation. All versions of ActivePerl prior to build 630 of ActivePerl 5.6.1 are vulnerable. Exploitation of this vulnerability may allow for remote attackers to gain access to the target server.

* References:
http://www.securityfocus.com/bid/3526
http://www.securityfocus.com/archive/1/241575
Recommendation A workaround, according to NSFOCUS, is to edit the "perlIIS.dll" ISAPI extension in Internet Service Manager and check "Check that file exists" option (enabled by default). This option will cause the server to first ensure that the requested file exists before the vulnerable code is reached.

To enable this option:
1) Open up the IIS MMC
2) Right click on a (virtual) directory in your web server, Choose Properties
3) Click on the Configuration... button, highlight the .plx item,
4) Click Edit, and then check Check that file exists.

-- OR --

Upgrade to version of ActivePerl 5.6.1Build 630 or newer. You can download the version from:
http://www.activestate.com/Products/ActivePerl/download.plex
Related URL CVE-2001-0815 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)