Webdev fuss so what?

From: peter devris (peterdevrisat_private)
Date: Thu May 08 2003 - 17:16:39 PDT

  • Next message: Irvin Temp: "RE: OS identification"

    
     ('binary' encoding is not supported, stored as-is)
    What is all the fuss about the webdev vul?
    
    I have an IIS5.0 server SP3 and thought I best check
    this out so tried the following to test and exploit my
    server
    
    webdevfinder.pl - by SensePost Research
          returns - WebDAV possibly in use
     
    OK looks like a problem, so now test exploit using:
    
    webdavx.pl  - by isnoat_private
       returns - attempting all the offsets 0-7:
         send buffer...  
          telnet target 7788
          if fail, try other offset(0-7)
        
        All telnet attempts failed to connect!
    
    webdavIIS50.pl by www.infowarfare.dk
      Returns
        IIS 5.0 WebDAV BufferOverflow attack
        but fails to do anything!!
    
    wbr.exe -  ntdll.dll exploit trough WebDAV by kralor[Crpt]
         failed to nc to my listening port!
    
         Results:
         Checking WebDav on 'xxxx' ... FOUND
         exploiting ntdll.dll through WebDav [ret: 0x00100010]
         Connecting... CONNECTED
         Sending evil request... SENT
         Server seems to be patched.
         data: HTTP/1.1 500 Internal Server Failure
         Server: Micr╠╠ņē↕
    
         Hey this server is not patched!
    
    Ok all the above failed, so I am safe?
    
    Next step was to build a Win2k SP 1 - default install
    IIS5.0 and repeat all the above.
    
    Guess what all failed, so even with SP1 and SP3 -
    straight out of the box I was not vuln to this WebDev
    exploit
    
    So what is all of the fuss about?
    During the testing both Web servers still ran and never
    when down.
    
    Cheers peter
    
    ---------------------------------------------------------------------------
    Did you know that you have VNC running on your network?
    Your hacker does.
    Plug your security holes.
    Download a free 15-day trial of VAM:
    http://www.securityfocus.com/StillSecure-pen-test
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Fri May 09 2003 - 11:45:38 PDT