absolutely im still tring to figure out if I could pass a CSCRIPT.EXE
parameter.  :)

-----Original Message-----
From: Patrick Smallwood [mailto:[EMAIL PROTECTED]]
Sent: Thursday, March 07, 2002 9:32 PM
To: [EMAIL PROTECTED]
Subject: Re: scary site



So I am mostly an MS Exchange admin, and still learning the basics, (have
learned alot over the past 6 months thanks to this list!)

Could this vulnerability launch cmd as a service or edit the \run reg key?
if so, in what user context? (current user?)
Could it be launched with a command (ie del/format/shutdown)?

Just wondering worse case...sorry for the naive security question

Thank you,
Patrick





                      Martin Klaus
                      <[EMAIL PROTECTED]>         To:
<[EMAIL PROTECTED]>
                                               cc:
                      03/06/2002 11:27         Subject:  Re: scary site
                      AM





It doesn't work with IE5.5 under Win NT4.0

regards
Martin


At 12:30 05.03.02 -0500, leon wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>http://www.liquidwd.freeserve.co.uk/
>
>
>Try it with a windows machine and IE with all patches.
>
>Be afraid be very afraid.
>
>FYI this is for all those people who are think that just having a
>firewall is enough.

___________________________________________________________
"Sechzig Milliarden Gigabytes können eine ganze Menge.
Sie putzen sogar Fenster...." (Frederic Pohl)


ODN OnlineDienst Nordbayern GmbH
Rechenzentrum und Besuchsanschrift:
Steinstr. 19
D-90419 Nürnberg
Martin Klaus
Tech Support und Administration
Hotline (nur regional): 0180 3213233
my E-Mail: [EMAIL PROTECTED]  my Fax: +49 911 - 93428 00025
Fax allgemein: +49 911 - 933 8 777


http://support.odn.de

Geschäftsführer der Gesellschaft: Bruno Schnell, Stefan Hartmann
Sitz der Gesellschaft: Nürnberg - Registergericht Nürnberg/HR.B 15398
___________________________________________________________




Reply via email to