FW: Footprints of ASP ISAPI filter buffer overflows

From: Jonathon.Kalaugher@sbg-ap.com
Date: Thu Apr 11 2002 - 20:34:22 PDT

  • Next message: Justin Shore: "Re: <victim>server formmail.pl exploit in the wild"

    > Hello security people,
    > 
    > re:	Cumulative Patch for Internet Information Services (Q319733)
    > 
    > Has anybody found or know of a "footprint" left by the ASP ISAPI extension
    > overflow in IIS web logs?
    > 
    > Has anybody a copy of some log files that contain such for general review
    > by the community?
    > 
    > A customer was vulnerable to this attack and I would like to find out if
    > he was compromised.
    > 
    > Thanking you all in advance.
    > 
    > Jon
    > 
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Fri Apr 12 2002 - 08:58:57 PDT