FrontPage Chicanery

Brown, David S. Brown.Davids at mayo.edu
Fri Feb 23 09:03:09 EST 2001


You can also get some information here:

http://www.microsoft.com/technet/security/tools.asp

Specifically, there is a checklist for securing IIS 4.0 under NT 4.0 and IIS
5.0 under Windows 2000.  I have used them in the past, and they seemed
fairly good at the time.  They are also updated regularly.

Hope this helps...

-Dave
David Brown, Library Systems Manager
Mayo Medical Libraries, Rochester  MN
brown.davids at mayo.edu   (507) 284-2461

-----Original Message-----
From: Mark Pecaut [mailto:pecautm at missouri.edu]
Sent: Thursday, February 22, 2001 4:41 PM
To: Multiple recipients of list
Subject: [WEB4LIB] Re: FrontPage Chicanery


I don't use Frontpage, but they could be looking for frontpage 
vulnerabilites.  I don't know if they still do, but the 
frontpage `extensions' have a history of letting people 
overwrite passwords, or even run arbitrary commands on the 
webserver.  
It is explained better here:
http://www.insecure.org/sploits/Microsoft.frontpage.insecurities.html

Just a shot in the dark,
Oh, yes, and `vti' stands for `Vermeer Technology Inc'.
This is the company MS bought so they could have Frontpage.


On Thu, Feb 22, 2001 at 02:03:54PM -0800, Thomas Dowling wrote:
> Web4Lib--
> 
> Would someone who works with FrontPage 4 explain to me why copies of it
> from all over the world try to both GET and POST documents on my server in
> various "/_vti_" files or directories?
> 
> And has anyone ever taken a 10GB core file, named it "_vti_inf.html" and
> given such FP'ers what they deserve?  [fx: Dowling's evil chortle]

I haven't, but it sounds like fun!
 
> 
> Thomas Dowling
> OhioLINK - Ohio Library and Information Network
> tdowling at ohiolink.edu

-Mark


More information about the Web4lib mailing list