Microsoft has confirmed a “zero-day” security vulnerability affecting Internet Information Services (IIS). The security hole was initially reported ahead of Christmas on December 23rd, “our initial assessment shows that the IIS web server must be in a non-default, unsafe configuration in order to be vulnerable. An attacker would have to be authenticated and have write access to a directory on the web server with execute permissions which does not align with best practices or guidance Microsoft provides for secure server configuration. Customers using out of the box configurations and who follow security best practices are at reduced risk of being impacted by issues like this,” revealed MSRC blog.
Resources and best practices for securely configuring IIS servers:
- IIS 6.0 Security Best Practices
- Securing Sites with Web Site Permissions
- IIS 6.0 Operations Guide
- Improving Web Application Security: Threats and Countermeasures