info
discussion
exploit
solution
references
Multiple Vendor Unprivileged User Permissions Log File Modification Vulnerability
References:
Internet Information Server 4 Baseline Security Checklist
(Microsoft)
Microsoft Technet Security
(Microsoft)
Norton Internet Security Homepage
(Symantec)
Q315986: IIS 4: Log Settings May Be Modified By an Unprivileged User with the De
(Microsoft)
Privacy Statement
Copyright 2010, SecurityFocus