>From the Security Wire Digest (www.infosecuritymag.com):

> *IIS PATCH COULD HAVE PREVENTED DEFACEMENT
> High-profile Web defacements of computer security firm Network
> Associates and its subsidiary McAfee in Brazil last Thursday
> could have been prevented if readily available IIS patches had
> been applied upstream at a Brazil-based service provider.
> Microsoft itself suffered two breaches of its Web site recently
> when it failed to patch one of its own IIS servers.

This source gives no more details that that.

--
KH


On Tue, 5 Dec 2000, Paul D. Robertson wrote:

> On Tue, 5 Dec 2000, Ken Hardy wrote:
> 
> > I saw something on some list or other that said that the NAI
> > Brazil site was hacked through bugs in IIS.  No firewall will
> > protect against in-band attacks like that.  However, whereas
> > their products may be off the hook, their security procedures
> > are not; there is an available patch from MS that fixes the IIS
> > bug that was exploited, but they had not applied the fix.
> 
> RDS is still the #1 vector of attack for IIS servers and the damn thing's
> been fixed for something like 2 years.  There's a *lot* of brokeness out
> there, and it's a shame to see a security company fall victim to essential
> system patch issues.  Do you know if it was RDS, or one of the other IIS
> canopeners?
> 
> Thanks,
> 
> Paul
> -----------------------------------------------------------------------------
> Paul D. Robertson      "My statements in this message are personal opinions
> [EMAIL PROTECTED]      which may have no basis whatsoever in fact."
>                                                                      PSB#9280
> 
> 





-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to