漏洞类别:Web server漏洞等级:
漏洞信息
On a default installation of Microsoft IIS (Internet Information Server) Version 4, the "/iisadmpwd" virtual directory is created. For IIS Version 5, although not installed by default, this can be easily created manually. This package is used to administrate the IIS Web server from a remote server.
This directory physically maps to C:\winnt\system32\inetsrv\iisadmpwd, and contains numerous files with .htr extensions. The iisadmpwd sample scripts that are included contain numerous vulnerabilities.
漏洞危害
By exploiting scripts in the iisadmpwd directory, unauthorized users can brute force the administrator password and valid logins on your server.
解决方案
If you do not need to administrate your IIS server from a remote host, then you should remove the iisadmpwd directory from your server.
For further workarounds, please refer to the following Bugtraq postings:
A HREF="http://marc.info/?l=bugtraq&m=91983486431506&w=2" TARGET="_blank"> A HREF="http://marc.info/?l=bugtraq&m=92000623021036&w=2" TARGET="_blank">
Virtual Patches:
Trend Micro Virtual Patching
Virtual Patch #1000441: 1000441 - Microsoft IIS IISADMPWD Proxied Password Attack
0day
文章评论