Greetings!

Brian Steele schrieb:

> Hmm.. Can someone give an example of how a "compromise" that opens the
> internal network to the attacker could work, if the proxy server is passing
> only HTTP traffic on port 80 between the internal server and the Internet
> client?

With the right buffer-overflow you can transfer and execute arbitrary code to
and on the attacked webserver. For example the Microsoft IIS comes (by default)
with some sample-scripts that do have such known exploits.

You do not always need a Telnet connection to be able to run exploits...   ;-)

Bye
    Volker

--

Volker Tanger  <[EMAIL PROTECTED]>
 Wrangelstr. 100, 10997 Berlin, Germany
    DiSCON GmbH - Internet Solutions
         http://www.discon.de/


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to