The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request.
This module exploits a vulnerability in the MSADCS.DLL library of the Microsoft Data Access Components (MDAC) used by the Microsoft IIS Server. By default remote access to this component is not granted but if the Remote Data Services (RDS) are enabled this exploit could be used to enter into the target machine. This exploit could be also used to escalate privileges in the target machine if the source agent is the same machine. After successful exploitation an agent will be installed.
After successful exploitation an agent will be installed. The process being exploited is usually run as an IUSR or IWAM user, specially created for IIS to answer anonymous requests. If this condition is present, the newly deployed agent will run with an unprivileged user.
Microsoft IIS is prone to a remote stack-based buffer-overflow vulnerability affecting the application's FTP server. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
The vulnerability exists because of a buffer overrun in the remote debug functionality of FrontPage Server Extensions. This functionality enables users to remotely connect to a server running FrontPage Server Extensions and remotely debug content. An attacker who successfully exploited this vulnerability could be able to run code with IWAM_machinename account privileges on an affected system.
This module exploits a vulnerability in the .ASP ISAPI filter. After successful exploitation an agent will be installed. The process being exploited is usually running with lowered privileges.