Subscribe: Comments on: Microsoft IIS Semicolon Bug Leaves Servers Vulnerable
Added By: Feedage Forager Feedage Grade A rated
Language: English
apache  bad  critical  don  iis semicolon  iis  microsoft  morgan storey  morgan  patch  release patch  security hole  security  storey 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Comments on: Microsoft IIS Semicolon Bug Leaves Servers Vulnerable

Comments on: Microsoft IIS Semicolon Bug Leaves Servers Vulnerable

Hacking Tools, Hacker News & Cyber Security

Last Build Date: Tue, 06 Mar 2018 00:35:18 +0000


By: cert

Mon, 18 Jan 2010 18:53:32 +0000

shit lammer !

By: Mormoroth

Wed, 13 Jan 2010 17:40:43 +0000

microsoft publishe news about this vulnerability they said its not a security hole !!! i wonder how its not a security hole that permit miscolious file can be executed

By: Morgan Storey

Thu, 31 Dec 2009 10:54:48 +0000

I don't think Microsoft bashing is really justified here. IIS 6's patching has been very few so far. Sure it isn't as flexable as Apache but security wise it ain't too bad. Compare this to the huge number of apache flaws (the http keep alive request DOS anyone) MS does bad coding and bad releases, as does The open source movement, look at the Debian SSH debacle. OSS's advantage is freedom and flexability.

By: Rishabh Dangwal

Wed, 30 Dec 2009 20:55:16 +0000

@ - d3m4s1@d0v1v0 As usual MS will release a patch,say a few more words about their dedication to increase user experience,productivity,privacy(?) and security...and after week or maybe 2 week later release one more patch which will address problems posed by the patch 1.. the loop goes on :)

By: droope

Wed, 30 Dec 2009 11:18:23 +0000

We might learn from this not to trust our security to microsoft ever again. We might, since they still have a chance to place a patch.

By: Andy Davies

Tue, 29 Dec 2009 17:57:00 +0000

Demonstrates the need for permissions to be set at all levels, denying execute on the folder that the users content is uploaded to should help mitigate against this too. It's worth noting that it doesn't appear to apply to -

By: Morgan Storey

Tue, 29 Dec 2009 12:11:37 +0000

Having admin'ed a few IIS servers and attacked a few in my time. This is pretty damned critical and the work around is all-be it not to bad, but not workable on a big IIS farm, a patch is the best solution. I haven't tested the : vuln that was mentioned, but that one looks interesting using NTFS alternate streams to remote rootkit the box is pretty cool, but also bad. I guess there is also the work-a-round of input validation on your upload fields, ensuring no : or ; are allowed.

By: d3m4s1@d0v1v0

Tue, 29 Dec 2009 11:42:48 +0000

It doesn't seems "less critical" to me, there are tons of sites that allow image uploads but don't scripts like .asp... this incur in a serious remote file inclusion vulnerability, and RFI is not a "less critical" problem... Well, let's see what MS says about this...