The vulnerability exists because of a buffer overrun in the remote debug functionality of FrontPage Server Extensions. This functionality enables users to remotely connect to a server running FrontPage Server Extensions and remotely debug content. An attacker who successfully exploited this vulnerability could be able to run code with IWAM_machinename account privileges on an affected system.
This module exploits a vulnerability in the .ASP ISAPI filter. After successful exploitation an agent will be installed. The process being exploited is usually running with lowered privileges.
This module exploits a stack-based buffer overflow vulnerability in IBM Tivoli Endpoint by sending a specially crafted HTTP request. The specific flaw exists within the lcfd.exe process which listens by default on TCP port 9495. To reach this page remotely authentication is required. However, by abusing a built-in account an attacker can access the restricted pages. While parsing requests to one of these, the process blindly copies the contents of a POST variable to a 256 byte stack buffer.