Microsoft Internet Explorer 5.0.1/5.5 – ‘mstask.exe’ CPU Consumption (Denial of Service)

Microsoft Internet Explorer 5.0.1/5.5 – ‘mstask.exe’ CPU Consumption (Denial of Service)

漏洞ID 1053502 漏洞类型
发布时间 2000-12-13 更新时间 2000-12-13
图片[1]-Microsoft Internet Explorer 5.0.1/5.5 – ‘mstask.exe’ CPU Consumption (Denial of Service)-安全小百科CVE编号 N/A
图片[2]-Microsoft Internet Explorer 5.0.1/5.5 – ‘mstask.exe’ CPU Consumption (Denial of Service)-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/20515
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/2129/info

Microsoft Internet Explorer ships with a task scheduler engine (mstask.exe). By default mstask.exe listens between port 1025 to 1220.

It is possible for a user to cause CPU utilization DoS. Sending malformed arguments to the mstask.exe service will cause the CPU utilization to spike. By default, mstask.exe enables connections through the local host only. A restart of the system is required in order to gain normal functionality.

Exploitation of this vulnerability could be more serious with repeated attacks.

* Conflicting reports exist, some users have been unable to reproduce this issue. 

1. Start telnet.exe
2. Menu->Connect->Remote System=127.0.0.1 , Port=1026
3. Press 'Connect' button
4. When it is connects, type some random characters and press enter.
5. Close telnet.exe.

相关推荐: ISC DHCP分配服务器(dhcpd)多缓冲器溢出漏洞

ISC DHCP分配服务器(dhcpd)多缓冲器溢出漏洞 漏洞ID 1206749 漏洞类型 缓冲区溢出 发布时间 1999-12-31 更新时间 1999-12-31 CVE编号 CVE-1999-0808 CNNVD-ID CNNVD-199912-136…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享