lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <200404221836.57172.noamr@beyondsecurity.com>
From: noamr at beyondsecurity.com (Noam Rathaus)
Subject: SSL IIS Remote Root

On Thursday 22 April 2004 16:17, Gabriel Alexandros wrote:
> Hi,
>
> i currently have 2 IIS5 servers on my network and i would like to know how
> they can be patched either with registry or file alterations, against the
> IIS 5 SSL remote root (IIS SSL is running due to ecommerce and elearning
> systems).
>
> Thanks in advance
Hi,

You can find here an exploit code that will actually test your server for the 
vulnerability:
http://www.securiteam.com/windowsntfocus/5CP0L0KCKO.html

Hope this helps.

-- 
Thanks
Noam Rathaus
CTO
Beyond Security Ltd.

Join the SecuriTeam community on Orkut:
http://www.orkut.com/Community.aspx?cmm=44441


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ