[11573] in bugtraq

home help back first fref pref prev next nref lref last post

Re: FrontPage Personal Web Server

daemon@ATHENA.MIT.EDU (Kerb)
Sun Aug 29 00:36:42 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-Id:  <01BEEF25.114DEAA0.kerb@fnusa.com>
Date:         Wed, 25 Aug 1999 18:10:08 -0500
Reply-To: Kerb <kerb@FNUSA.COM>
From: Kerb <kerb@FNUSA.COM>
X-To:         Thomas Hsieh <tyh@corp.earthlink.net>
To: BUGTRAQ@SECURITYFOCUS.COM

Tom,
	I really don't have access to a copy of FP2000.  If someone does, and would
like to test the exploit, I'd appreciate any feedback possible.  I would
suspect that the overflow still exists, being that most/all MS products are of
little worth.  One thing that would really help in the server would be to block
access from all IP's except 127.0.0.1.

-Kerb



On Tuesday, August 24, 1999 2:44 PM, Thomas Hsieh [SMTP:tyh@corp.earthlink.net]
wrote:
: Have you tested this exploint on FP2000?
:
:
: -Tom
:
: On Mon, 23 Aug 1999, Kerb wrote:
:
: > Date: Mon, 23 Aug 1999 03:28:39 -0500
: > From: Kerb <kerb@FNUSA.COM>
: > To: BUGTRAQ@SECURITYFOCUS.COM
: > Subject: FrontPage Personal Web Server
: >
: > I'm sorry if this exploit has already been released, but to the best of my
: > knowledge, it hasn't.  This is a small exploit (written in perl) that takes
: > advantage of the poor URL length handling of FrontPage 98's personal web
: > server
: > that is executed when you open/create a "web".  This exploit will work on
: > most
: > machines with a perl interpreter, I coded it (and tested it, of course) on
: > my
: > Wind0ze 95 machine.  If ya have any questions or comments about this
script,
: >
: > feel free to Email me.
: >
: >
: >
: >
: > -KerberosX	:	kerb [at] linuxfreak [dot] com
: >
: >
: >
: >
: >
: >

home help back first fref pref prev next nref lref last post