The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS02-028: Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise (Q321599)
Time: 18:34 EST/23:34 GMT | News Source: ActiveWin.com | Posted By: Todd Richardson

This patch eliminates a newly discovered vulnerability affecting Internet Information Services. Although Microsoft typically delivers cumulative patches for IIS, in this case we have delivered a patch that eliminates only this new vulnerability, while completing a cumulative patch. When the cumulative patch is customer-ready, we will update this bulletin with information on its availability. The FAQ provides information on the circumstances surrounding the vulnerability, and why we believe releasing a singleton patch immediately is in customers’ best interests. To ensure that servers are fully protected against past as well as current vulnerabilities, we strongly recommend installing the previous cumulative patch (discussed in Microsoft Security Bulletin MS02-018) before installing this patch.

The vulnerability is similar to the first vulnerability discussed in Microsoft Security Bulletin MS02-018. Like that vulnerability, this one involves a buffer overrun in the Chunked Encoding data transfer mechanism in IIS 4.0 and 5.0, and could likewise be used to overrun heap memory on the system, with the result of either causing the IIS service to fail or allowing code to be run on the server. The chief difference between the vulnerabilities is that the newly discovered one lies in the ISAPI extension that implements HTR – an older, largely obsolete scripting technology – where the previous one lay in the ISAPI extension that implements ASP.

Write Comment
Return to News

  Displaying 576 through 580 of 580
Prev | First
  The time now is 8:43:24 PM ET.
Any comment problems? E-mail us
#576 By 4240821 (82.115.4.230) at 7/15/2025 12:20:31 AM
https://sluts.su/v/p9pygkq3wt79.php
https://sluts.su/v/a2serfvfu3nv.php
https://sexonly.su/v/r4l9t4oeqff1.php
https://sexonly.top/v/r7dcau1ougbd.php
https://sluts.su/v/n5ffipuyniq8.php
https://sexonly.top/v/thlmj89h38zn.php
https://sexonly.su/v/i4oe7pan3hzj.php
https://sluts.su/v/g4oonbavp49o.php
https://sluts.su/v/byrxy89imott.php
https://lustful.su/v/dd4tktyezxoo.php

#577 By 4240821 (82.115.4.230) at 7/15/2025 3:21:16 PM
https://nsfw.su/v/yvupo2hygyzg.php
https://sluts.su/v/ipfgu4hp4po8.php
https://lustful.su/v/jcboz6rns5rl.php
https://lustful.su/v/3okqdevruq6e.php
https://sluts.su/v/gbqbwmo5bkmv.php
https://sexonly.top/v/49hynz6n7dj0.php
https://lustful.su/v/m167yvw6dj52.php
https://nsfw.su/v/w16n44iu221m.php
https://sluts.su/v/va7h8h3hahe9.php
https://sluts.su/v/gv6gj5omnb07.php

#578 By 4240821 (82.115.4.230) at 7/17/2025 5:49:10 AM
https://sluts.su/v/k2ztprmpoaw5.php
https://sluts.su/v/s4xlqdkxdd01.php
https://sexonly.su/v/tj9j1uiwhph5.php
https://lustful.su/v/ki0n6hpminrp.php
https://nsfw.su/v/9myptnsq0n6n.php
https://sluts.su/v/nnwwwo09gp0t.php
https://sluts.su/v/66g7hkleavm5.php
https://nsfw.su/v/kbxonleq1o5i.php
https://sexonly.top/v/5qx9ezeauxbv.php
https://sexonly.top/v/gi3hucc449px.php

#579 By 4240821 (82.115.4.230) at 7/19/2025 10:49:54 AM
https://sluts.su/v/v8glwwgez7yq.php
https://sluts.su/v/6hnjwnjsgq7h.php
https://lustful.su/v/lmzdnxra4s2c.php
https://lustful.su/v/t0j3j9edmokt.php
https://sexonly.su/v/zjx0necdwird.php
https://lustful.su/v/jg4taxbhwu9n.php
https://nsfw.su/v/4vadx2pie4w7.php
https://lustful.su/v/297n72l32jtk.php
https://sexonly.su/v/i9rt4t77da3q.php
https://sexonly.top/v/h4vupo43kfbw.php

#580 By 4240821 (82.115.4.230) at 7/19/2025 2:47:40 PM
https://justpaste.me/d1Fg5
https://justpaste.me/csrh
https://justpaste.me/bz4C2
https://justpaste.me/Zq5g2
https://justpaste.me/ZwvY2
https://justpaste.me/afNN
https://justpaste.me/ZjzZ
https://justpaste.me/a41j
https://justpaste.me/Zduq
https://justpaste.me/a4ZP

Write Comment
Return to News
  Displaying 576 through 580 of 580
Prev | First
  The time now is 8:43:24 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *