Bugtraq mailing list archives

Re: Windows 2000 .printer remote overflow proof of concept exploit


From: David Litchfield <mnemonix () GLOBALNET CO UK>
Date: Wed, 2 May 2001 09:23:31 -0400

Matt Power <mhpower () BOS BINDVIEW COM>


       ... , will create a file called www.eEye.com.txt on the root of
drive c.
                ... This proof of concept exploit is not to be used as a
method of testing to see if your vulnerable or not.

In some environments, security staff may be responsible for
identifying which IIS 5.0 servers, out of a large collection of them,
still do not have a fix in place for this vulnerability. The security
staff may not have any convenient way to check for the existence of

Snip

My suggestion a while back, when the IIS htr overflow first arrived, was to
code up an exploit that downloads and installs the patch from a server
certified (by yourself) as safe. This way you kill two birds with one stone
;-)
Cheers,
David Litchfield


Current thread: