[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[stalk:00410] Re: IIS CGI Filename Decode Error Vulnerability
- To: security-talk@xxxxxxxxxxxxxxxxxxxx
- Subject: [stalk:00410] Re: IIS CGI Filename Decode Error Vulnerability
- From: Seiichi Nakashima <nakasei@xxxxxxxxxxxx>
- Date: Thu, 17 May 2001 08:42:48 +0900
「辞書買うのもったいないし、いちいち辞書めくるの面倒だな〜」
そんな時はインフォシーク!
「英和辞典」「和英辞典」「国語辞典」サービスはじめました。
http://jiten.infoseek.co.jp/?svx=971128
------------------------------------------------------------------------
中島です。
bugtraqで流れていたのですが、IISだけでなくMail環境も注意が必要なようです。
======
yehuda さんは書きました:
> This may be obvious, but even if a server is not accessible to the
>internet, you can exploit it via email. All you need is the following
>information:
>
>> 1 - an email address on their network. It must be one that someone will
>> read, and the person must be using a reader that renders html mail.
>> 2 - the hostname or IP of the win2k server
>>
>> all you need to do is craft an html email to your mail user (see 1 above)
>> with the %25c double-parse vulnerability as a url in the mail message.
>> (Use an img tag so it will run automatically and attempt to download an
>> "image".)
>>
>> user reads the message, and blammo!
>>
> if an administrator feels he doesn't need to patch his win2k server
>because it's not available on the internet, think again.
>
------------------------------
Name : Seiichi Nakashima
E-Mail : nakasei@xxxxxxxxxxxx
------------------------------
--
- このメイリングリストに関する質問・問い合せ等は
- <security-talk@xxxxxxxxxx>までお知らせください
--
------------------------------------------------------------------------
ふとした疑問ありますか?
http://www.infoseek.co.jp/GHome?pg=gn_top.html&svx=971122