May 20 reported IIS6 a WebDAV loophole, foreign media today reported that hackers have exploited this loophole in the United States, Indiana University of the server breached. Hackers did not waste a bit of time because it was Monday, just a few hours, before the leaks were published and exploited. As of Tuesday, the university's servers were still not repaired successfully and were expected to be fully repaired by Thursday or Friday. The IIS6 WebDAV vulnerability discovered last week has been used in an attack, a vulnerability discovered by computer security expert Nikolaos Rangos can view and upload files to the IIS6 server via a forged HTTP request, the US computer Emergency response Team said recently. The attack exploits vulnerabilities in the process of handling Unicode token by Microsoft. Microsoft said in a statement that it has not heard of such attacks, but they are watching and will provide security advisers to help users. Vulnerabilities affect only those systems that have the WebDAV protocol enabled in IIS6, and WebDAV is used to share documents on the WEB. An attacker could view the server's files without authorization, and upload files to the server, Thierry Zoller, an independent security expert, confirmed Rangos's discovery, but Zoller said he had not found a way to run any malicious programs on the attacked server. Zoller also said that IIS5 and IIS7 are not currently affected, but other products using WebDAV technology may also be at risk. He advises users to disable the WebDAV protocol before receiving a Microsoft patch. Rangos said in an interview that the Exchange server and the SharePoint server that used WebDAV technology were not compromised. Cisco also issued the same security warning, saying in a security warning posted on its official website that IIS6 WebDAV technology, and site administrators with sensitive files in the site, should take action because the attack code has been made public.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.