News

Microsoft plugs BizTalk Server holes

Microsoft has warned users to fix a security flaw in its BizTalk Server enterprise integration product, which could allow an attacker to take over systems running the product.

The flaw exists in the document tracking and administration website that is part of both BizTalk Server 2000 and BizTalk Server 2002. Several of the site's pages validate input strings incorrectly, exposing the system to attacks, Microsoft said in security bulletin MS03-016.

An attacker could gain full control over the system running the BizTalk Server software by crafting a hyperlink containing malicious SQL commands and tricking a BizTalk Server user to follow that link. The commands would run on the server with the same level of permissions as the user, Microsoft said.

A second vulnerability only affects BizTalk Server 2002. A flaw exists in the HTTP (Hypertext Transfer Protocol) Receiver used for exchanging documents using HTTP. By sending a malformed request to the HTTP Receiver, an attacker can cause a buffer overrun and run code of his choice on the server.

One of BizTalk Server's primary functions is to transfer business documents between back-end business systems. HTTP is one of several document-receive functions; others include File Transfer Protocol (FTP) and SMTP (Simple Mail Transfer Protocol). The HTTP Receiver is not enabled by default.

Microsoft has also reissued a patch for Windows Server 2000 Terminal Server Edition originally released in security bulletin MS02-071 last December. An error in the installer for the earlier patch meant that the correct files were not being copied on to multi-processor systems, causing them to fail under certain scenarios, Microsoft said in a revised version of its bulletin.

This is the second time Microsoft has had to reissue a patch for the same problem. The first patch caused the NT 4.0 operating system to fail.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy