So I am mostly an MS Exchange admin, and still learning the basics, (have
learned alot over the past 6 months thanks to this list!)
Could this vulnerability launch cmd as a service or edit the \run reg key?
if so, in what user context? (current user?)
Could it be launched with a command (ie del/format/shutdown)?
Just wondering worse case...sorry for the naive security question
Thank you,
Patrick
Martin Klaus
<[EMAIL PROTECTED]> To:
<[EMAIL PROTECTED]>
cc:
03/06/2002 11:27 Subject: Re: scary site
AM
It doesn't work with IE5.5 under Win NT4.0
regards
Martin
At 12:30 05.03.02 -0500, leon wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>http://www.liquidwd.freeserve.co.uk/
>
>
>Try it with a windows machine and IE with all patches.
>
>Be afraid be very afraid.
>
>FYI this is for all those people who are think that just having a
>firewall is enough.
___________________________________________________________
"Sechzig Milliarden Gigabytes k�nnen eine ganze Menge.
Sie putzen sogar Fenster...." (Frederic Pohl)
ODN OnlineDienst Nordbayern GmbH
Rechenzentrum und Besuchsanschrift:
Steinstr. 19
D-90419 N�rnberg
Martin Klaus
Tech Support und Administration
Hotline (nur regional): 0180 3213233
my E-Mail: [EMAIL PROTECTED] my Fax: +49 911 - 93428 00025
Fax allgemein: +49 911 - 933 8 777
http://support.odn.de
Gesch�ftsf�hrer der Gesellschaft: Bruno Schnell, Stefan Hartmann
Sitz der Gesellschaft: N�rnberg - Registergericht N�rnberg/HR.B 15398
___________________________________________________________