The university server was taken down by the IIS vulnerability attack

Source: Internet
Author: User
Keywords Server IIS
Tags computer files hackers iis media microsoft security server
May 20 reported IIS6 a WebDAV loophole, foreign media today reported that hackers have exploited this loophole in the United States, Indiana University of the server breached. Hackers did not waste a bit of time because it was Monday, just a few hours, before the leaks were published and exploited. As of Tuesday, the university's servers were still not repaired successfully and were expected to be fully repaired by Thursday or Friday. The IIS6 WebDAV vulnerability discovered last week has been used in an attack, a vulnerability discovered by computer security expert Nikolaos Rangos can view and upload files to the IIS6 server via a forged HTTP request, the US computer Emergency response Team said recently. The attack exploits vulnerabilities in the process of handling Unicode token by Microsoft. Microsoft said in a statement that it has not heard of such attacks, but they are watching and will provide security advisers to help users. Vulnerabilities affect only those systems that have the WebDAV protocol enabled in IIS6, and WebDAV is used to share documents on the WEB. An attacker could view the server's files without authorization, and upload files to the server, Thierry Zoller, an independent security expert, confirmed Rangos's discovery, but Zoller said he had not found a way to run any malicious programs on the attacked server. Zoller also said that IIS5 and IIS7 are not currently affected, but other products using WebDAV technology may also be at risk. He advises users to disable the WebDAV protocol before receiving a Microsoft patch. Rangos said in an interview that the Exchange server and the SharePoint server that used WebDAV technology were not compromised. Cisco also issued the same security warning, saying in a security warning posted on its official website that IIS6 WebDAV technology, and site administrators with sensitive files in the site, should take action because the attack code has been made public.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.