Re: Re: NTFS Alternate Data Stream vulnerability leaks webctrl.ini content
By: poindexter FORTRAN to Rob Swindell on Sun Jun 06 2021 10:03 am
With Windows NTFS, appending "::$DATA" to a filename is an alternate name for accessing a file's contents (data).
I saw a change to websrvr.c in the commit log - has there been any examples of exploits in the wild of this vulnerability, and should we be upgrading sooner rather than later or wait for the bigger picture solution you
refer to?
No, none that I'm aware of. The only vulnerability I imagined was the leaking of the contents of scripts (e.g. .xjs or .ssjs files) and webctrl.ini files. Most sysops probably don't think that stuff is too confidential to work much about.
--
digital man
Sling Blade quote #2:
Karl (re: killing Doyle): I hit him two good whacks in the head with it.
Norco, CA WX: 71.0�F, 53.0% humidity, 9 mph NNE wind, 0.00 inches rain/24hrs --- SBBSecho 3.14-Linux
* Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)