標(biāo)題: NT的漏洞及描述(英文) [打印本頁(yè)] 作者: 雜七雜八 時(shí)間: 2011-1-13 17:12 標(biāo)題: NT的漏洞及描述(英文) 受影響系統(tǒng):4.0,iis 1.09 x( f; r9 X7 k& u/ F1 e% ^
A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory. " S3 x4 B# m. F' r' Y) k5 K6 I" D( _' ]' ?1 w! Q1 q
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script. * R! h6 s! F5 O% F2 I: X + P7 z: A# }2 p* u6 L- v% yBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests. , x- j0 S0 d% ?! Z9 s* w" e) M( _
--------------------------------------------------------------------$ G( H* D+ G; ]' z$ z
: [8 W$ A" |0 P$ Q受影響系統(tǒng):4.0$ h [0 G+ ~% n2 D# @
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.9 J$ k! f. G9 R& `$ J/ ~; Q
+ Z; D. }3 _* C( x
If the file 'target.bat' exists, the file will be truncated. 4 o3 L) U) y8 z) Y/ C; u+ x: F8 S8 p& b* H
5 o" u7 A# _. ^4 y5 B" G, J8 h
A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''. ; Y7 w- L* K3 ]6 o" J8 w6 }5 ] , l! s/ x# `) n, I1 N! A---------------------------------------------------------------------- 3 v4 P# l: C) y& b. V! o. f* i+ Z/ L; J2 Y( n
受影響系統(tǒng):3.51,4.0 8 _ w% j; D1 y" H: u. ZMultiple service ports (53, 135, 1031) are vunerable to 'confusion'. / g9 U1 i6 l( C$ h' D % w6 a8 k2 u G# q5 D/ ]% @9 kThe following steps; : @( t* }' g$ V/ m; `2 q Y% O Z% Z: m3 |$ S5 K+ v: x0 v2 d$ `
Telnet to an NT 4.0 system on port 135 , |4 n- d2 }5 X
Type about 10 characters followed by a <CR> $ ~0 [6 a4 w% O0 N; a' zExit Telnet 6 F; H) ]0 T0 B6 w& dresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system. K+ T' F2 n: a/ v, s ( x/ [6 d- v3 I+ t8 F" M" ?3 EWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted. w u C7 y/ r, p6 k* I4 r' i" B2 w1 Z5 _( H- Q) f
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted. 0 N T9 L# W# J 4 S5 x" \0 L% b, L, cIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.+ o; Q' w5 c; T
L& S/ H2 q6 e
The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit): c& o3 Q# }# e7 G* ^# a( C( m # c4 s% p( \+ E/*begin poke code*/ + _% ]- f9 q1 N% S 8 t: l! D/ A T1 I, uuse Socket; - P' F$ l j0 O# K6 G5 u( i0 ~use FileHandle; / B# a& v' R- D. ~# x, arequire "chat2.pl"; $ l _5 ~6 e7 s, M3 D' ?# ?2 y2 c% ~" G; p& R. G9 r9 q
$systemname = $ARGV[0] && shift; + e, E; V3 @+ M- v ! z* J9 M+ F1 f$verbose = 1; # tell me what you're hitting ' Y3 {) M- i- X& h: }4 U$knownports = 1; # don't hit known problem ports+ Q# O) g, v G- h8 V( l
for ($port = $0; $port<65535; $port++) ) C4 j) E- o M{0 r- a, L0 ?' U& r$ V
: A4 g2 ]2 H2 [( f& v o/*end poke code*/" `. B$ E9 u& Y- J& T& C
8 Z, m9 U- d6 o% a- _0 |: h
Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername 2 e0 }. W+ }0 {% I! O % {( o! ]: Q% c1 Y-------------------------------------------------------------------------------- ) z2 d) G* _+ C0 N$ X$ }* B$ Y/ M* t) M- ^4 L
受影響系統(tǒng):4.00 C% ~2 Z2 j, g+ ] E U
Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS. " Q% ~3 q6 y) F& v" y2 U- P: j0 ~) T) C# Y1 _! ^! @0 q; c' U$ p$ A
This attack causes Dr. Watson to display an alert window and to log an error: " l4 f; N% M* S, Q# p# F' u: w, ?9 F
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"! X( J# }, l& ^4 r: J" }! P* C& G2 V
) K2 {( t. N. N* V3 Y- ?' g3 c
-------------------------------------------------------------------------------- e; L+ l' Y* B; C8 q
. H9 b( G3 m/ g% I) \) r受影響系統(tǒng):3.51,4.0, Z1 S" X) U* E5 f I
Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:) O7 K- B+ m a
! _ S" n) Z' [4 D; @1 C! h. U2 MSTOP: 0X0000001E 7 Q7 _' o) l. H% g8 n1 _: e$ BKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS 9 A. W0 C. b" Z# R& N: l4 [0 a1 f0 p& Y5 L' }8 }) r
-OR-% O" Y9 I8 V/ O$ c7 n
. a) h A) F0 nNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets. 8 m7 f* E0 q: j7 s ' a/ n# m$ b+ N L) ^5 z- d-------------------------------------------------------------------------------- , A) x6 i' z4 { K5 b$ T. Z9 C 3 d, b; C! _2 f2 uMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). ; I. M& J# l/ ], w/ e2 e: F+ o& I
5 q& z, [8 y$ i' q--------------------------------------------------------3 Y: n$ F& ~% l' `3 y5 i
" N R& W% K/ ~( z2 \% k: p4 c
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server