G
Guest
Guest
Archived from groups: microsoft.public.windowsxp.work_remotely (More info?)
When the system (WinXP with remote desktop enabled on port
80) is scanned with Retina Security scanner, a Malformed
HTR Request vulnerability is found but is specified to be
a NT4 issue. I have no NT4 machines on that port or on my
network for that matter. The description of the
vunerability is as follows:
TCP:80 - Malformed HTR Request - NT4
A vulnerability in IIS involves an unchecked buffer in the
filter DLLs for the following file types: .HTR, .STM
and .IDC files. The .htr, .STM and .IDC extensions are
used by ISAPI filters so an attacker can therefore
overflow those ISAPI filters and remotely execute code as
SYSTEM.
To correct the problem you are reffered to the following
hotfix page which specifies only NT4:
http://support.microsoft.com/support/kb/articles/Q234/9/05.
ASP
Please advise,
Just wanted to bring this to someone's attention as to
prevent any exploitaton of this.
Thanks,
Matt Curtis
When the system (WinXP with remote desktop enabled on port
80) is scanned with Retina Security scanner, a Malformed
HTR Request vulnerability is found but is specified to be
a NT4 issue. I have no NT4 machines on that port or on my
network for that matter. The description of the
vunerability is as follows:
TCP:80 - Malformed HTR Request - NT4
A vulnerability in IIS involves an unchecked buffer in the
filter DLLs for the following file types: .HTR, .STM
and .IDC files. The .htr, .STM and .IDC extensions are
used by ISAPI filters so an attacker can therefore
overflow those ISAPI filters and remotely execute code as
SYSTEM.
To correct the problem you are reffered to the following
hotfix page which specifies only NT4:
http://support.microsoft.com/support/kb/articles/Q234/9/05.
ASP
Please advise,
Just wanted to bring this to someone's attention as to
prevent any exploitaton of this.
Thanks,
Matt Curtis