| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: July patches |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_00BA_01C6A65F.4CF90550
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
It would be more than difficult with a default configuration as it =
requires the attacker to have the right to upload an ASP page. An admin =
has to go out of his way to allow anyone to upload code.
Rich
"Mike N." wrote in message =
news:7qacb2dk09mmsk16b96i7t651ig8vr1q4f{at}4ax.com...
On Thu, 13 Jul 2006 06:19:25 -0400, "Geo" wrote:
>I haven't seen anyone mention it but there are 12 new patches, =
almost all
>are critical remote code execution type things.
This is the first report of a remote IIS exploit in a very long =
time. It
would allow a mass IIS worm. Difficult to write, but not impossible =
with
default configurations.
------=_NextPart_000_00BA_01C6A65F.4CF90550
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
It would
be more than =
difficult with a=20
default configuration as it requires the attacker to have the right to = upload an=20
ASP page. An admin has to go out of his way to allow anyone to = upload=20
code.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.