Brian Steele wrote:
> For that to work, the "arbitrary commands" in the buffer-overflow exploit
> will have to set up an app listening on port 80 - the same port as the
> webserver, AND send and receive traffic using HTTP. May be possible, but
> sounds a bit far-fetched. The same-port issue might be the largest
> stumbling block.
>
> And the sample scripts are typically removed from any secure IIS
> installation anyway :-).
I wouldn't say 'typically'.
That aside, the app would just have to install a server-side script into
IIS that added an URL for the attacker to use to activate their program and
pass commands in the URI ...
--
Michael T. Babcock (PGP: 0xBE6C1895)
http://www.fibrespeed.net/~mbabcock/
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]