The information in this article applies to:
SUMMARY
When you run a Web hosting service or any other service that allows ISAPI extensions to be used, the potential for malicious code being written and posted to the Web server exists. For example, someone could write an ISAPI extension that uses the RevertToSelf (a highly trusted call) and effectively bypass the server's security through the ISAPI extension (for instance, they could restart the server or gain access to trusted files). MORE INFORMATION
The following is an example of how to use the Dumpbin.exe utility to find RevertToSelf inside of a DLL: dumpbin /imports isapi.dll | find /i "RevertToSelf"In the example above, isapi.dll should be changed with the name of the ISAPI extension on the server that you want to check. NOTE: If an error occurs when you run Dumpbin.exe, you may need to run the bin\vcvars32.bat file from a command prompt. This batch file will register the paths to the appropriate folders. For detailed information on Dumpbin.exe (including command-line switches that can be used), see the MSDN Visual Studio documentation. The Microsoft Platform SDK also contains some information on running this utility. Additional query words:
Keywords : |
Last Reviewed: February 2, 2000 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |