Blind buffer overflows in ISAPI extensions
In this paper we will use different ISAPI extension on a Microsoft Windows 2000, Internet Information Server (IIS) 5.0 web server. A number of different ISAPI extensions were created, each with a different type of stack-based overflow vulnerability to act as demonstrative proprietary applications as seen in the wild. The following examples are overflows using strcpy(), sprintf(), and strcat(). A second set of extensions had also been built with the Microsoft Visual Studio .NET stack protection enabled (/GS option). The author will demonstrate how to bypass these protection mechanisms and execute arbitrary code completely blind.
By Isaac Dawson at SecurityFocus.
[ Read more ]