Critical Flaw Found in Content Management Server

Microsoft on Wednesday revealed a critical flaw in its Microsoft Content Management Server. The most serious of three newly discovered vulnerabilities could allow an attacker to remotely execute code on a server in the Local System context.

Content Management Server, a member of Microsoft's .NET Enterprise Server family that also includes SQL Server and Exchange, is server middleware for building and managing enterprise Web sites, including those with e-business components.

The most dangerous flaw consists of a buffer overrun in a low-level function that performs user authentication, according to Microsoft. One Web page -- and possibly more -- included with Content Management Server 2001 passes inputs directly to the function. That gives an attacker an opportunity to overrun the buffer.

Exploiting the vulnerability could allow code to be run in the context of the MCMS service, which runs as Local System.

But Microsoft says that if organizations deploy the URLScan tool on the server, the maximum damage the flaw can allow is a denial-of-service attack.

The other two problems reported this week are both rated "moderate" on Microsoft's threat scale.

A pair of flaws could be exploited in combination to upload attack code to a server, and a SQL injection vulnerability could be exploited to run operating system commands on the server. Neither of the two "moderate" vulnerabilities could give the attacker administrative privileges on the server.

The main competitive differentiator for Microsoft Content Management Server is price and the economic stability of its parent company. Microsoft introduced Content Management Server last year after buying the technology from nCompass Labs, which had developed a content management system called Resolution built on Microsoft's COM architecture.

A Microsoft security bulletin containing a patch for the three vulnerabilities can be found here:

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.


  • Microsoft Talks Teams and SharePoint at Modern Workplace Event

    It's a hybrid world, but remote work is here to stay, according to Microsoft's Teams and SharePoint head Jeff Teper.

  • Malwarebytes Affirms Other APT Attack Methods Used Besides 'Solorigate'

    Security solutions company Malwarebytes affirmed on Monday that alternative methods besides tainted SolarWinds Orion software were used in the recent "Solorigate" advanced persistent threat (APT) attacks.

  • How To Fix the Hyper-V Read Only Disk Problem

    DOS might seem like a relic now, but sometimes it's the only way to fix a problem that Windows seems ill-equipped to deal with -- like this one.

  • Microsoft Warns IT Pros on Windows Netlogon Fix Coming Next Month

    Microsoft on Thursday issued a reminder to organizations to ensure that their systems are properly patched for a "Critical"-rated Windows Netlogon vulnerability before next month's "update Tuesday" patch distribution arrives.

comments powered by Disqus