Free Republic
Browse · Search
General/Chat
Topics · Post Article

Much more details including code snippets at website.
1 posted on 04/15/2015 7:33:51 PM PDT by Utilizer
[ Post Reply | Private Reply | View Replies ]


To: Utilizer

“one of the fly rods has gone out of skew on the treadle”


2 posted on 04/15/2015 7:34:41 PM PDT by ClearCase_guy ("Victim" -- some people eagerly take on the label because of the many advantages that come with it.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

People still use IIS to serve sites?


5 posted on 04/15/2015 8:16:56 PM PDT by some tech guy (Stop trying to help, Obama)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

Hey here’s some data, let’s execute it!


6 posted on 04/15/2015 8:21:02 PM PDT by Ray76 (Obama says, "Unlike my mum, Ruth has all the documents needed to prove who Mark's father was.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: patro

9 posted on 04/15/2015 8:51:12 PM PDT by patro
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

IMPORTANT: This vulnerability is in all Windows 7 and Windows 8 systems, not just IIS servers.

“This security update is rated Critical for all supported editions of Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2.”

Microsoft Security Bulletin MS15-034 - Critical

https://technet.microsoft.com/library/security/ms15-034

It is for home computers, too. Not just servers.


10 posted on 04/15/2015 8:51:54 PM PDT by PastorBooks
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

More information:

Remote Kernel Code Execution Via HTTP Request In IIS On Windows | Hacker News
https://news.ycombinator.com/item?id=9380468

Remote Code Execution Via HTTP Request In IIS On Windows
https://ma.ttias.be/remote-code-execution-via-http-request-in-iis-on-windows

MS15-034 Test
https://lab.xpaw.me/MS15-034/?host=bing.com


11 posted on 04/15/2015 8:54:16 PM PDT by PastorBooks
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Windows Server IIS vulnerability ... PING!

You can find all the Windows Ping list threads with FR search: search on keyword "windowspinglist".

Of interest to the System Admins on the ping list, but ALSO to anyone running web services on Win 7 or Win 8...

12 posted on 04/15/2015 8:55:15 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

Oh, well, it’s all part of the monthly patch cycle. Remote code execution with SYSTEM account privileges is not something you’d want to let hang around. Should have about 250 servers patched by Friday night. It’s what I do.


13 posted on 04/15/2015 8:57:47 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer
According to Netcraft, https://mail.clintonemail.com/ is running Microsoft-IIS/7.5.

Must be secure, since it's alleged to be under USSS protection! But, really, what difference does it make?

22 posted on 04/16/2015 1:31:37 AM PDT by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Utilizer

BFL


30 posted on 04/16/2015 10:07:33 AM PDT by metesky (My investment program is holding steady @ $0.05 cents a can.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson