more technical details :
 
http://isc.sans.org/diary.php?date=2004-10-06
http://www.k-otik.com/news/10052004.ASPNETFlaw.php
http://blogs.devleap.com/rob/archive/2004/10/02/1803.aspx
http://www.heise.de/security/news/meldung/51730
 
cheers
Stephen


"Evans, Arian" <[EMAIL PROTECTED]> wrote:
Hadn't seen this on the lists yet:

Cannonicalization issue in ASP.NET


Microsoft is currently investigating a reported
vulnerability in Microsoft ASP.NET. An attacker
can send specially crafted requests to the server
and view secured content without providing the
proper credentials. This reported vulnerability
exists in ASP.NET and does not affect ASP.


http://www.microsoft.com/security/incident/aspnet.mspx

Their interim "fix" is to add an event handler to
force real path validation for all requests:

http://support.microsoft.com/?kbid=887459

Which is certainly not a bad idea but methinks
another performance/security tradeoff at hand.

Thanks for the heads-up Daniel...

Arian Evans
Sr. Security Engineer
FishNet Security

KC Office: 816.421.6611
Direct: 816.701.2045
T! oll Free: 888.732.9406
Fax: 816.474.0394

http://www.fishnetsecurity.com



The information transmitted in this e-mail is intended only for the addressee and may contain confidential and/or privileged material.
Any interception, review, retransmission, dissemination, or other use of, or taking of any action upon this information by persons or entities
other than the intended recipient is prohibited by law and may subject them to criminal or civil liability. If you received this communication
in error, please contact us immediately at 816.421.6611, and delete the communication from any computer or network system.


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Find local movie times and trailers on Yahoo! Movies.

Reply via email to