# # Msadcs.dll locate. # # This plugin was written in NASL by RWT roelof@sensepost.com # # Changes by rd: # - french if(description) { script_id(10357); name["english"] = "RFP exploit (msadcs.dll) located"; name["francais"] = "RFP exploit (msadcs.dll) possiible"; script_name(english:name["english"], francais:name["francais"], deutsch:name["deutsch"]); desc["english"] = " The webserver is likely vulnerable to a common IIS exploit from a hacker called 'Rain Forest Puppy'. This exploit enables an attacker to execute _ANY_ command on the server with Administrator Privileges. The exploit is made possible via a buffer overflow in /msadc/msadcs.dll See BUGTRAQ ID 529 on www.securityfocus.com (http://www.securityfocus.com/bid/529) for more information. Risk factor: High"; desc["francais"] = "Le script msadcs.dll a été trouvé dans /msadc/. C'est un script de démo qui permet a des pirates d'executer du code arbitraire sur le système distant. Solution : effacez-le Facteur de risque : Elevé Voir aussi : BUGTRAQ ID 529 on www.securityfocus.com (http://www.securityfocus.com/bid/529)"; script_description(english:desc["english"], francais:desc["francais"]); summary["english"] = "Determines the presence of msadcs.dll"; summary["francais"] = "Vérifie la présence de /msadc/msadcs.dll"; script_summary(english:summary["english"], francais:summary["francais"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2000 Roelof Temmingh ", francais:"Ce script est Copyright (C) 2000 Roelof Temmingh " ); family["english"] = "CGI abuses"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("find_service.nes"); script_require_ports("Services/www", 80); exit(0); } # # The script code starts here # port = get_kb_item("Services/www"); if(!port)port = 80; if(get_port_state(port)) { cgi = "/msadc/msadcs.dll"; if(is_cgi_installed(cgi)) { security_hole(port); exit(0); } }