[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[stalk:00410] Re: IIS CGI Filename Decode Error Vulnerability



    「辞書買うのもったいないし、いちいち辞書めくるの面倒だな〜」    

            そんな時はインフォシーク!            
    「英和辞典」「和英辞典」「国語辞典」サービスはじめました。    
          http://jiten.infoseek.co.jp/?svx=971128         
------------------------------------------------------------------------


中島です。

bugtraqで流れていたのですが、IISだけでなくMail環境も注意が必要なようです。

======

yehuda さんは書きました:
>	This may be obvious, but even if a server is not accessible to the
>internet, you can exploit it via email. All you need is the following
>information:
>
>> 1 - an email address on their network. It must be one that someone will
>> read, and the person must be using a reader that renders html mail.
>> 2 - the hostname or IP of the win2k server
>> 
>> all you need to do is craft an html email to your mail user (see 1 above)
>> with the %25c double-parse vulnerability as a url in the mail message.
>> (Use an img tag so it will run automatically and attempt to download an
>> "image".)
>> 
>> user reads the message, and blammo!
>> 
>	if an administrator feels he doesn't need to patch his win2k server
>because it's not available on the internet, think again.
>

------------------------------
 Name   : Seiichi Nakashima
 E-Mail : nakasei@xxxxxxxxxxxx
------------------------------
--
- このメイリングリストに関する質問・問い合せ等は
- <security-talk@xxxxxxxxxx>までお知らせください
--
------------------------------------------------------------------------
           ふとした疑問ありますか?           
   http://www.infoseek.co.jp/GHome?pg=gn_top.html&svx=971122