Microsoft Security Bulletin MS00-010 - Critical
Patch Available for "Site Wizard Input Validation" Vulnerability
Published: February 18, 2000
Originally Posted: February 18, 2000
Microsoft has released a patch that eliminates a security vulnerability in web applications associated with Microsoft® Site Server 3.0, Commerce Edition. These applications are provided as samples and generated by wizards, but do not follow security best practices. If deployed on a web site, they could allow inappropriate access to a database on the site. Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-010.mspx
Two sample web sites provided as part of Site Server 3.0, Commerce Edition do not follow security best practices; the code generated by one of the wizards is affected by the same problem. The code requests an identification number as one of the inputs, but does not validate it before using it in a database query. As a result, a malicious user could, instead of entering an appropriate input, provide SQL commands. If this were done, the SQL commands would be executed as part of the query, and could be used to create, modify, delete or read data in the database.
The vulnerability only affects sites that have either deployed the code at issue here, or have used the code as a model for developing custom code. Customers who have deployed the code should apply the patch to ensure that security best practices are followed. Customers who have used the code as a guide in developing their own should refer to the Knowledge Base article referenced below for specific code changes.
Affected Software Versions
- Microsoft Site Server 3.0, Commerce Edition
Vulnerability Identifier: CVE-2000-0161
Note: Additional security patches are available at the Microsoft Download Center
Please see the following references for more information related to this issue.
- Frequently Asked Questions: Microsoft Security Bulletin MS00-010, http://www.microsoft.com/technet/security/bulletin/fq00-010.mspx.
- Microsoft Knowledge Base (KB) article 252614, Potential Security Vulnerability Due to Unvalidated Variable in Wizard and Some Sample Sites
- Microsoft TechNet Security Web site, http://www.microsoft.com/technet/security/default.mspx.
Obtaining Support on this Issue
This is a fully supported patch. Information on contacting Microsoft Technical Support is available at http://support.microsoft.com/contactussupport/?ws=support.
Microsoft thanks Nick Southwell of Creative Online Media for reporting this problem to us and working with us to protect customers.
- February 18, 2000: Bulletin Created.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Built at 2014-04-18T13:49:36Z-07:00