Used Microsoft IIS4 Session ID Cookie Marking Vulnerability Patch for Windows?
Developer’s Description
IIS supports the use of a session ID cookie to track the current session identifier for a Web session. However, ASP in IIS does not support the creation of secure session ID cookies as defined in RFC 2109. As a result, secure and non-secure pages on the same Web site use the same session ID. If a user initiated a session with a secure Web page, a session ID cookie would be generated and sent to the user, protected by SSL. But if the user subsequently visited a non-secure page on the same site, the same session ID cookie would be exchanged, this time in plaintext. If a malicious user had complete control over the communications channel, he could read the plaintext session ID cookie and use it to connect to the user's session with the secure page. At that point, he could take any action on the secure page that the user could take.
The conditions under which this vulnerability could be exploited are rather daunting. The malicious user would need to have complete control over the other user's communications with the Web site. Even then, the malicious user could not make the initial connection to the secure page; only the legitimate user could do that. The patch eliminates the vulnerability by adding support for secure session ID cookies in ASP pages. (Secure cookies already are supported for all other types of cookies, under all other technologies in IIS).
See the FAQ for more information.
Used Microsoft IIS4 Session ID Cookie Marking Vulnerability Patch for Windows?
Explore More

Super Socks5Cap
Trial versionTaoist VPN
Free
TrustPort Total Protection
Trial version
WinTSD
Trial version
FormosaAuditor Vulnerability Management
Trial versionInygma-Net
Trial version
AE Protector
Trial version
ETechUnblocker
FreeStaticX Surveillance
Trial versionAmigabit Privacy Cleaner
Trial version
Super Network Tunnel Portable
Trial version
Super Socks5Cap Portable
Trial version