lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <546598114.20090908124640@Zoller.lu>
Date: Tue, 8 Sep 2009 12:46:40 +0200
From: Thierry Zoller <Thierry@...ler.lu>
To: Kingcope <kcope2@...glemail.com>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: [Full-disclosure] Microsoft Internet Information Server ftpd zeroday

Hi Kingcope,

Thanks to a hint by "Petar" on the G-SEC blog [1] it  appears
that the  very same bug was present in IIS3 and IIS4 and discovered
by eeye in 1999 :
http://research.eeye.com/html/advisories/published/AD19990124.html

"Microsoft  IIS  (Internet  Information Server) FTP service contains a
buffer overflow in the NLST command. This could be used to DoS a remote
machine and in some cases execute code remotely."

Is this the same bug andwas the bug re-introduced ? Has Microsoft
fixed  LS  but  not NLST?  "svn" mishap ?

Maybe Mudge and/or Dildog can comment - would certainly be interesting
to know whether and if HOW this bug was reintroduced.

[1] http://blog.g-sec.lu/2009/09/iis-5-iis-6-ftp-vulnerability.html

Regards,
Thierry ZOLLER

--
http://blog.zoller.lu



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ