D
Dinis Cruz
Have anybody tested if the latest RPC vulnerabilities can be executed
from an Asp.Net page running in an un-patched server? Since it is
possible to make direct Win32 API calls from Asp.Net there is a high
change that these vulnerabilities will work.
If that is possible, please provide the test code in order for me to
add it to our ANSA (Asp.Net Security Analyser, see
http://www.gotdotnet.com/Community/Workspaces/Workspace.aspx?id=36ae9a2c-8740-4b52-924e-320edf64fba5)
so that system administrators can quickly identify the vulnerable
servers and patch them.
Note that at the moment there is no 'real' solution to disabling Win32
API calls in IIS 5.0 and IIS 6.0. Which means that if these
vulnerabilities exist, then it would be a critical problem, because
everybody that hosts .Net websites in shared hosting environments
would be affected.
Best regards
Dinis Cruz
..Net Security Consultant
DDPlus (www.ddplus.net)
from an Asp.Net page running in an un-patched server? Since it is
possible to make direct Win32 API calls from Asp.Net there is a high
change that these vulnerabilities will work.
If that is possible, please provide the test code in order for me to
add it to our ANSA (Asp.Net Security Analyser, see
http://www.gotdotnet.com/Community/Workspaces/Workspace.aspx?id=36ae9a2c-8740-4b52-924e-320edf64fba5)
so that system administrators can quickly identify the vulnerable
servers and patch them.
Note that at the moment there is no 'real' solution to disabling Win32
API calls in IIS 5.0 and IIS 6.0. Which means that if these
vulnerabilities exist, then it would be a critical problem, because
everybody that hosts .Net websites in shared hosting environments
would be affected.
Best regards
Dinis Cruz
..Net Security Consultant
DDPlus (www.ddplus.net)