The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Trio of bugs bite MS Content Management Server
Time: 03:22 EST/08:22 GMT | News Source: The Register | Posted By: Alex Harris

A trio of vulnerabilities in Microsoft's Content Management Server (MCMS) has come to light, the most serious of which potentially allows attackers to gain control of victim's machines. Microsoft has issued a patch - which Redmond characterises as of "critical importance" - designed to fix the problem with Content Management Server 2001 software, Redmond's product for the development and management of e-business Web sites.

First up, and most seriously, there's a buffer overrun flaw in a low-level function that performs user authentication in MCMS 2001. The result of exploiting this vulnerability would be to either cause MCMS to fail, or run code in the context of the MCMS service (which runs as Local System). Next there's a SQL injection vulnerability affecting a function that services requests for image files and other resources. Exploiting this flaw could enable an attacker to run SQL commands on the server, which would "not only allow data in the MCMS database to be added, changed or deleted, but would also enable the attacker to run operating system commands on the server," Microsoft admits.

Write Comment
Return to News

  Displaying 726 through 726 of 726
Prev | First
  The time now is 10:03:55 AM ET.
Any comment problems? E-mail us
#726 By 4240821 (185.100.168.238) at 12/2/2025 7:30:14 AM
https://lustful.su/activghfd21hha5
https://sluts.su/activ2ecf13bafd
https://lustful.su/activf1hbbaf34h
https://sluts.su/activchefdfd5e1
https://lustful.su/activcb4d2aea4d
https://nsfw.su/activd111h4adb2
https://sexonly.top/activd22f3b53bd
https://sluts.su/activhc12bd2deb
https://sexonly.su/activ2e5heg523e
https://sluts.su/active531ffffgh

Write Comment
Return to News
  Displaying 726 through 726 of 726
Prev | First
  The time now is 10:03:55 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *