The Artima Developer Community
Sponsored Link

.NET Buzz Forum
Vulnerability Update

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
Scott Watermasysk

Posts: 661
Nickname: scottwater
Registered: Aug, 2003

Scott Watermasysk is an ASP.NET developers. He wrote the .Text blog engine.
Vulnerability Update Posted: Oct 7, 2004 7:11 PM
Reply to this message Reply

This post originated from an RSS feed registered with .NET Buzz by Scott Watermasysk.
Original Post: Vulnerability Update
Feed Title: ScottW's ASP.NET WebLog
Feed URL: /error.aspx?aspxerrorpath=/blog/rss.aspx
Feed Description: ASP.NET and Blogging
Latest .NET Buzz Posts
Latest .NET Buzz Posts by Scott Watermasysk
Latest Posts From ScottW's ASP.NET WebLog

Advertisement

Adding a couple lines of code your favorite Global.asax file was an OK for a quick and immediate patch. However, it is not very realistic for a longer term patch.  Today, Microsoft has released an MSI which will install an HttpModule into the GAC and adds it to your Machine.Config. This should effectively patch all of your sites without the need to add any code yourself.

Microsoft has released an HTTP module that Web site administrators can apply to their Web server that will protect all ASP.NET applications on the server against URL canonicalization problems known to Microsoft as of the publication date. This module, as well as detailed guidance and deployment information, is available from the Microsoft Download Center.

Go get it here.

Read: Vulnerability Update

Topic: ASP.NET Vulnerability Previous Topic   Next Topic Topic: Omea Reader: RSS/ATOM and Newsgroup reader from Jetbrains

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use