Bugtraq mailing list archives
IIS Advisory
From: Marc () EEYE COM (Marc)
Date: Sun, 24 Jan 1999 16:43:21 -0800
Hi, I have been getting a few eMails from people saying they could not reproduce the overflow. Most of them were using NT4's ftp.exe. If you look at what NT4's ftp.exe does... it does not send the ls command correctly therefore its not going to work. If you would like to test the overflow I suggest two things. Use NT5's ftp.exe or write your own code. We didnt want to release a hack.exe program to test the overflow. To many people would run around crashing whatever they could find. So please stop sending me eMail saying you cannot do it. If you are sending it correctly and cannot reproduce it then send me an eMail. However please dont send me something like the following:
I could not reproduce this on a machine with Wintdows NT 4.0/Service Pack 4 and IIS 4.0. I get "sorry, input line too long".
Thats your clients problem. Once again if your either writing your own program or using an ftp program that functions properly and the overflow still does not work. Then eMail me. Signed, Marc eEye Digital Security Team http://www.eEye.com
Current thread:
- Re: SSH 1.x and 2.x Daemon, (continued)
- Re: SSH 1.x and 2.x Daemon Yutaka OIWA (Jan 25)
- Call for Papers: UNIX AND WINDOWS NT Fred Donck (Jan 25)
- New IE4 privacy issue aleph1 () UNDERGROUND ORG (Jan 25)
- Re: SSH 1.x and 2.x Daemon Jim Bourne (Jan 25)
- Re: backdoored tcp wrapper source code Wietse Venema (Jan 23)
- LocalSecure Testing Program NSS SDT (Jan 21)
- Re: backdoored tcp wrapper source code John Stange (Jan 24)
- Advisory: IIS FTP Exploit/DoS Attack Marc (Jan 24)
- Re: Advisory: IIS FTP Exploit/DoS Attack Seth McGann (Jan 24)
- Re: Advisory: IIS FTP Exploit/DoS Attack Matt Conover (Jan 25)
- IIS Advisory Marc (Jan 24)
- Re: Sendmail 8.8.x/8.9.x bugware Brock Rozen (Jan 18)
- Linux 2.0.36 vulnerable to local port/memory DoS attack David Schwartz (Jan 19)
- Re: Sendmail 8.8.x/8.9.x bugware Steve VanDevender (Jan 19)