Skip to content
This repository has been archived by the owner on Nov 2, 2018. It is now read-only.

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
sergiogarciadev committed Nov 18, 2015
1 parent b0b237f commit 0334385
Showing 1 changed file with 43 additions and 52 deletions.
95 changes: 43 additions & 52 deletions README.md
@@ -1,61 +1,52 @@

*******************************************************************************
**
** UPDATE: Microsoft has a Fix
**

Microsoft has published a fix, using a diferent approch as used here.
They are limiting the number of post parameters to exactly 1000.

To install this update, use Windows Update or visit the link belowe:

http://technet.microsoft.com/en-us/security/bulletin/ms11-100.mspx


This project however can be used for study of the IIS Modules and for future
problems.

# UPDATE: Microsoft has a Fix

********************************************************************************

**
** Old README
**

** The Problem
Microsoft has published a fix, using a diferent approch as used here.
They are limiting the number of post parameters to exactly 1000.

This is a simple IIS 7 module to avoid the zero day vulnerability which targets
string hash colisions discovered by Alexander "alech" Klink and Julian "zeri"
Wälde [1] which is described in a security advisory [2].
To install this update, use Windows Update or visit the link belowe:

There was a security advisory [2] of Microsoft describing the problem and a
blog post explaing in details the problem [3].
http://technet.microsoft.com/en-us/security/bulletin/ms11-100.mspx

** The Proposed Solution

This solution consists in expection the request input before ASP .net and
detecting duplicated form post hashes.

If the form post is "big" ann contains a duplicated hash then the request
is rejected.

I used some reference to implement this module. [5]

** Warning

This solution needs more work, I only released it now to share the discovery
with the community and to receive comments.
This project however can be used for study of the IIS Modules and for future
problems.

I will add more checks and check more data at input, it will be released
until the end of the week.

Please send any comments to <sergio@ginx.com.br>.
# Old README

## The Problem

This is a simple IIS 7 module to avoid the zero day vulnerability which targets
string hash colisions discovered by Alexander "alech" Klink and Julian "zeri"
Wälde [1] which is described in a security advisory [2].

There was a security advisory [2] of Microsoft describing the problem and a
blog post explaing in details the problem [3].

## The Proposed Solution

This solution consists in expection the request input before ASP .net and
detecting duplicated form post hashes.

If the form post is "big" ann contains a duplicated hash then the request
is rejected.

I used some reference to implement this module. [5]

## Warning

This solution needs more work, I only released it now to share the discovery
with the community and to receive comments.

I will add more checks and check more data at input, it will be released
until the end of the week.

Please send any comments to <sergio@ginx.com.br>.

The vulnerability is better described in these links:

[1] http://events.ccc.de/congress/2011/Fahrplan/attachments/2007_28C3_Effective_DoS_on_web_application_platforms.pdf
[2] http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3414
[3] http://technet.microsoft.com/en-us/security/advisory/2659883
[4] http://blogs.technet.com/b/srd/archive/2011/12/27/more-information-about-the-december-2011-asp-net-vulnerability.aspx
[5] http://learn.iis.net/page.aspx/169/develop-a-native-cc-module-for-iis/
[1] http://events.ccc.de/congress/2011/Fahrplan/attachments/2007_28C3_Effective_DoS_on_web_application_platforms.pdf
[2] http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3414
[3] http://technet.microsoft.com/en-us/security/advisory/2659883
[4] http://blogs.technet.com/b/srd/archive/2011/12/27/more-information-about-the-december-2011-asp-net-vulnerability.aspx
[5] http://learn.iis.net/page.aspx/169/develop-a-native-cc-module-for-iis/

0 comments on commit 0334385

Please sign in to comment.