News

Microsoft's ISA Server Is Only Half Patched

Microsoft's clarification of an Internet Security and Acceleration (ISA) Server patch released this month has left at least one security expert stumped.

The heart of the matter involves security advisory (973472), which was released on Monday of last week. Bulletin 973472 describes possible vulnerabilities affecting Redmond's ISA Server, specifically an ActiveX bug associated with Office Web Components (OWC). That security advisory should not to be confused with the ISA Server fix associated with a Radius One Time password setting that was addressed in the July security patch released on Tuesday.

The important part seems to be how OWC is used in ISA Server, according to David B. Cross, a product unit manager at Microsoft's Server Products Division.

"As many customers have noticed, ISA Server 2004 and ISA Server 2006 were included [in the security advisory] on the 'Applies to' product list," Cross said in a Forefront team blog, while noting that ISA Server 2000 and Forefront Threat Management Gateway aren't included. Cross goes on to say that the OWC vulnerability affecting ISA Server can be mitigated as "ISA report generation does not use the vulnerable OWC code path."

Still confused? You're not alone.

"David's Web page seems pretty confusing. He tries to say that the servers aren't vulnerable, but at the same time, he says putting in the mitigation (killbit) doesn't break anything," stated Eric Schultze, chief technology officer at Shavlik Technologies, in an e-mail. "I read this and I'm not sure what his real recommendation is."

Schultze said Tuesday's ISA server patch pertained to a scenario involving password breaches provided the ISA Server was configured specifically for Radius One Time password parameters. That issue, after applying Tuesday's patch, is presumably resolved. However, the OWC problem is still up in the air.

"The OWC patch is simply a bad control," Schultze added. "If you're sitting on the ISA Server and you browse to an evil Web page and view an evil Excel workbook (via the OWC control), the attacker can run code on the system. The ISA Server can't be exploited unless someone at the ISA console goes to an evil Web page to view the file in question."

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • FTC Expands Microsoft Antitrust Investigation Under Trump Administration

    The Federal Trade Commission (FTC) is pressing ahead with a broad investigation into Microsoft's business practices, an inquiry that began in the final weeks of the Biden administration.

  • An image of planes flying around a globe

    2025 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • Microsoft to Shut Down Skype Services

    Microsoft will discontinue its Skype telecommunications and video calling services on May 5, 2025, marking the end of the platform's decades-long run.

  • Big Blue To Acquire Datastax in Enterprise AI Play

    In a bid to bolster its enterprise-aimed AI capabilities, IBM is planning to acquire Datastax, a leading AI and data solutions provider, for an undisclosed amount.