Bugtraq mailing list archives
RE: IIS5 .idq exploit
From: "Marc Maiffret" <marc () eeye com>
Date: Wed, 18 Jul 2001 21:47:06 -0700
SANS is a bit behind the curve if they have just announced this today as this has been around for a few weeks now. First on some geocities website, then on packetstorm, then finally on the win2ksec mailing list (and a few others). As a side note... a few people have confused the .ida worm with hsj's exploit... hsj's exploit is _not_ a worm. Just wanted to clear that up for the handful of people I have seen misreporting things. Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538 http://eEye.com/Retina - Network Security Scanner http://eEye.com/Iris - Network Traffic Analyzer http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities |-----Original Message----- |From: Jason Staples - CNW [mailto:ellis () cnw com] |Sent: Wednesday, July 18, 2001 6:14 PM |To: bugtraq () securityfocus com |Subject: IIS5 .idq exploit | | | |SANS accounced its availability today, and after spending a bit of time |searching, I finally found the new IIS5 exploit. | |http://www.geocities.co.jp/MotorCity/5319/iis5idq_exp.txt | |Regards, |Jason | |+--------------------------------------+----------------------------+ || Jason Staples jason () cnw com | /"\ | || Network Engineer Security Analyst | \ / ASCII Ribbon Campaign | || | X Against HTML E-Mail | || Connect Northwest Internet Services. | / \ <!-- <HTML> --> | |+--------------------------------------+----------------------------+ |
Current thread:
- IIS5 .idq exploit Jason Staples - CNW (Jul 18)
- RE: IIS5 .idq exploit Marc Maiffret (Jul 18)