

DOVES Vulnerability V-00109
DOVES Project
Computer Security Laboratory
Department of Computer Science
University of California at Davis
Brief summary: An attacker can read some protected files using a malformed URL.
Detailed description: Microsoft's Internet Information Service by default associates file names that end in ".htr" with a DLL called "ism.dll". This DLL sees the "+" and truncates it and everything beyond. It then opens the target file and interprets it as "htr" commands. If the target file is not an ".htr" file, this causes parts of the contents to be displayed.
Components: ism.dll, Microsoft IIS 4.0, 5.0
Operating system(s): Windows NT 4.0, all versions; Windows 2000, all versionsThe attacker can view files with the privileges of IIS (usually Administrator)
How to detect:
How to fix:
Other information:
PA Classification:
RISOS Classification:
Davis Classification:
Common Vulnerability Exposure: SM.DLL in IIS 4.0 and 5.0 allows remote attackers to read file contents by requesting the file and appending a large number of encoded spaces (%20) and terminated with a .htr extension, aka the ".HTR File Fragment Reading" or "File Fragment Reading via .HTR" vulnerability. [CAN-2000-0457]
Attacks: See Doves exploit #108
Advisories:
Who reported it: Zuo Lei in ISBASE Advisory on July 17, 2000: discovered the problem
Send email to doves@cs.ucdavis.edu
Department of Computer Science
University of California at Davis
One Shields Ave.
Davis, CA 95616-8562
Dove images © 1999-2000 www.barrysclipart.com