![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Confirmed User
Join Date: Jun 2001
Location: ONLINE
Posts: 330
|
Code Red - hacked by chinese worm
For any of you running Microsoft IIS servers on NT or Win2K, there is a worm that is spreading throughout the internet at a rapid rate. Any of you that use cashtour saw it the other night.
In order to prevent this, you will need to go to this location and retrieve the patch knowns as: MS01-33 Unchecked Buffer in Index Server ISAPI Extension Could Enable Web Server Compromise You can find the patch here: http://www.microsoft.com/technet/tre...n/MS01-033.asp The following information is taken from the Microsoft website and sums up the problem: ~~A security vulnerability results because idq.dll contains an unchecked buffer in a section of code that handles input URLs. An attacker who could establish a web session with a server on which idq.dll is installed could conduct a buffer overrun attack and execute code on the web server. Idq.dll runs in the System context, so exploiting the vulnerability would give the attacker complete control of the server and allow him to take any desired action on it. The buffer overrun occurs before any indexing functionality is requested. As a result, even though idq.dll is a component of Index Server/Indexing Service, the service would not need to be running in order for an attacker to exploit the vulnerability. As long as the script mapping for .idq or .ida files were present, and the attacker were able to establish a web session, he could exploit the vulnerability. ~~ Regards, ------------------ Midnight Midnight Ventures Partner Program Excellence is not an act, but a habit - Aristotle |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Confirmed User
Join Date: Mar 2001
Location: Los Angeles
Posts: 224
|
I said it once and i'll say it again. My response to Ludedude suits in this thread just fine.
![]() http://bbs.gofuckyourself.com/board/...ML/005790.html Seriously though, great post Midnight ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Confirmed User
Join Date: May 2001
Location: Philly, PA USA
Posts: 206
|
I just posted a CNet article on about the same thing. The strange part is that I looked (not seached) to see if someone posted it already. Now I see this thread
![]() And to further question my own sanity, I can't find the one I posted originally ![]() ![]() (okay... now that I typed that, they won't) Maybe I need to look for a new line of work ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Tube groupie.
Industry Role:
Join Date: Aug 2002
Location: LoScandalous, CA
Posts: 13,482
|
I have been eaten http://www.stormfront.org/forum/
|
![]() |
![]() ![]() ![]() ![]() ![]() |