RE: Microsoft Windows 2000 WebDAV Buffer Overflow Vulnerability

From: Florian Hines (panth3rat_private)
Date: Wed Mar 19 2003 - 10:11:18 PST

  • Next message: Peter Van Epp: "modem protective device?"

    According to the SANS conference yesterday the exploit uses a 
    GET command rather than LOCK.  Also "The snort-signatures that 
    are out now are extremely unreliable at this point" but that 
    could have changed since yesterday I suppose.  
    
    Florian
    
    
    ##-----Original Message-----
    ##From: Aleksander P. Czarnowski [mailto:alekcat_private] 
    ##Sent: Wednesday, March 19, 2003 8:08 AM
    ##To: Nicolas Gregoire; garyo@sec-1.com
    ##Cc: pen-testat_private
    ##Subject: RE: Microsoft Windows 2000 WebDAV Buffer Overflow 
    ##Vulnerability
    ##
    ##
    ##> You could give a look to the related Nessus plugin :
    ##> #http://cvs.nessus.org/cgi-bin/cvsweb.cgi/~checkout~/nessus-plug
    ##ins/scrip
    ##ts/iis_webdav_overflow.nasl
    ##
    ##First of all - just from quick testing - it seems than nessus 
    ##plugin don't work correctly, at least one from 18th of March. 
    ##Secondly you can use a bit brutal method of using LOCK or any 
    ##other WebDAV method with buffer >64kb - it was already 
    ##discussed on ntbugtraq and snort-sigs I believe. But this is 
    ##still far from working exploit that gives you reverse shell... 
    ##Best Regards Aleksander Czarnowski AVET INS
    ##
    ##---------------------------------------------------------------
    ##-------------
    ##Did you know that you have VNC running on your network? 
    ##Your hacker does. Plug your security holes now! 
    ##Download a free 15-day trial of VAM: 
    ##http://www2.stillsecure.com/download/sf_vuln_li#st.html
    ##
    ##
    #
    
    
    
    ----------------------------------------------------------------------------
    Did you know that you have VNC running on your network? 
    Your hacker does. Plug your security holes now! 
    Download a free 15-day trial of VAM:
    http://www2.stillsecure.com/download/sf_vuln_list.html
    



    This archive was generated by hypermail 2b30 : Wed Mar 19 2003 - 10:18:48 PST