|
|
ru.nethack- RU.NETHACK ------------------------------------------------------------------- From : Nikita Melikhov 2:5030/1081.63 10 Jul 2003 06:04:14 To : All Subject : Взлом [2] --------------------------------------------------------------------------------
Расскажите про дыры(как воспользоваться, что это даст и т.д.). Есть эксплойты?
ЪДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДД Report.txt ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДД
www.**********.com
IP адрес компьютера "www.**********.com" : ***.***.***.***
Обратный DNS по этому адресу "**********.com"
Компьютер находится в сети (TTL = 239)
Cеть класса C (максимальное число компьютеров 254)
TCP порты
- открытые : 15
- закрытые : 2914
- недоступные : 11
- порт 80/tcp
сервер HTTP : Apache/1.3.9 (Unix)
состояние : 200 (OK)
текущие дата и время : (Thu, 10 Jul 2003 03:58:09 GMT)
формат содержимого : (text/html)
соединение : (close)
определение следующей информации находится пока в тестовом режиме
реальное имя http-сервера совпадает с указанным в его ответе
сервер HTTP : Apache HTTP Server (1.3.X)
_*подозрение на существование уязвимости*_
*просмотр файлов на диске (ошибка в модуле mod_rewrite) и листинг директорий*
описание уязвимости:
Apache Rewrite Module Arbitrary File Disclosure Vulnerability:
mod_rewrite is a module shipped with Apache 1.2 and later.
It is used to map special URLS to absolute files on the
web server's filesystem. If a RewriteRule directive is
expressed whose result maps to a filename containing
regular expression references, the result may provide an
attacker with the ability to view arbitrary files on the host.
Apache Artificially Long Slash Path Directory Listing Vulnerability:
In a default configuration, Apache enables mod_dir, mod_autoindex,
and mod_negotiation. However, by placing a custom crafted request
to the Apache server consisting of a long path name created
artificially by using numerous slashes, this can cause these modules
to misbehave, making it possible to escape the error page, and gain
a listing of the directory contents.
This vulnerability makes it possible for a malicious remote user
to launch an information gathering attack, which could potentially
result in compromise of the system.
Additionally, this vulnerability affects all releases
of Apache previous to 1.3.19.
Solution: Upgrade.
Patch: http://httpd.apache.org/dist/
Urls:
http://www.securityfocus.com/bid/1728
http://www.securityfocus.com/bid/2503
- порт 23/tcp
_сервер TELNET - терминал удаленного доступа_
BSDI BSD/OS 4.1 (bus3.lacompworks.com) (ttyp0)
login:
------------------------------------------
- порт 53/tcp
сервер DNS (TCP)
рекурсия не поддерживается сервером
возможен трансфер зоны "lacompworks.com"
/_версия BIND : 8.2.2-P7+tsig+infoleak_/
_*подозрение на существование уязвимости*_
*командная строка*
описание уязвимости:
Возможно удаленное выполнение команд при включенной рекурсии сервера.
The vulnerabilities described in this advisory affect nearly all currently
deployed recursive DNS servers on the Internet. The DNS network is
considered
a critical component of Internet infrastructure. There is no information
implying that these exploits are known to the computer underground, and
there
are no reports of active attacks. If exploits for these vulnerabilities
are
developed and made public, they may lead to compromise and DoS attacks
against
vulnerable DNS servers. Since the vulnerability is widespread, an Internet
worm may be developed to propagate by exploiting the flaws in BIND.
Widespread
attacks against the DNS system may lead to general instability and
inaccuracy
of DNS data.
Solution: Upgrade to bind 8.2.7, 8.3.4 or 4.9.11
URLs:
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21469
_*подозрение на существование уязвимости*_
*командная строка и/или DOS-атака*
описание уязвимости:
A buffer overflow vulnerability exists in multiple implementations of
DNS resolver libraries. Operating systems and applications that
utilize vulnerable DNS resolver libraries may be affected. A remote
attacker who is able to send malicious DNS responses could potentially
exploit this vulnerability to execute arbitrary code or cause a denial
of service on a vulnerable system.
Solution : Upgrade to a corrected version of the DNS resolver libraries.
Url:
http://www.cert.org/advisories/CA-2002-19.html
_*подозрение на существование уязвимости*_
*переполнение буфера (shell code)*
описание уязвимости:
Multiple vulnerabilities in various versions
of BIND.
Version 8 of BIND contains a overflow that may be exploitable
to remote attackers. Due to a bug that is present when handling
invalid transaction signatures, it is possible to overwrite some
memory locations with a known value. If the request came in via
the UDP transport then the area partially overwriten is a stack
frame in named. If the request came in via the TCP transport then
the area partically overwriten is in the heap and overwrites
malloc's internal variables. This can be exploited to execute
shellcode with the privileges of named (typically root).
It is believed that most (if not all) versions of BIND in use
contain a vulnerability that may allow an attacker to view
named's memory. This may aid an attacker in further attacks.
The problem occurs in the Compressed Zone Transfer (ZXFR)
functionality of BIND. A default installation of BIND does not
support the transfer of compressed zone files. However, daemon
that allows zone transfers and recursive queries will crash if
queried for a compressed zone transfer that is not in the nameserver
cache. This could result in a name resolution Denial of Service for
all users and systems depending upon
nameservers using the affected software.
Solution: Upgrade.
Patch: Get it from Your vendor
Url:
http://www.securityfocus.com/bid/2302
http://www.securityfocus.com/bid/2321
http://www.securityfocus.com/bid/1923
- порт 111/tcp
сервис RPC Port Mapper (карта портов)
список портов:
100000 - vers=2 (tcp : 111) - Port Mapper
100000 - vers=2 (udp : 111) - Port Mapper
- порт 515/tcp
ответ сервиса:
/_lpd: Malformed from address #10_/
_*подозрение на существование уязвимости*_
*возможно переполнение буфера в ОС Solaris и BSD*
описание уязвимости:
Buffer overflow in lpd daemon in BSD and Solaris.
It has been reported that it is possible to execute
commands on target hosts through lpd by manipulating
the use of sendmail by the daemon. If this
vulnerability is successfully exploited, remote
attackers can execute any command on the target host
with superuser privileges.
Solution: Upgrade.
Patch:
http://www.BSDI.COM/services/support/patches/patches-4.1/M410-044
http://sunsolve.sun.com
Urls:
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?id=advise94
http://www.securityfocus.com/bid/3274
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?id=advise80
- порт 1109/tcp
ответ сервиса на http запрос:
/_ERR Kerberos authentication failure: Generic kerberos error (KFAILURE) #13_/
#10
ответ на Ms SQL запрос:
/_ERR Kerberos authentication failure: Generic kerberos error (KFAILURE) #13_/
#10
- порт 53/udp
сервер DNS (UDP)
сервер поддерживает рекурсию
_версия BIND : 8.2.2-P7+tsig+infoleak_
_*подозрение на существование уязвимости*_
*командная строка*
описание уязвимости:
Возможно удаленное выполнение команд при включенной рекурсии сервера.
The vulnerabilities described in this advisory affect nearly all currently
deployed recursive DNS servers on the Internet. The DNS network is
considered
a critical component of Internet infrastructure. There is no information
implying that these exploits are known to the computer underground, and
there
are no reports of active attacks. If exploits for these vulnerabilities
are
developed and made public, they may lead to compromise and DoS attacks
against
vulnerable DNS servers. Since the vulnerability is widespread, an Internet
worm may be developed to propagate by exploiting the flaws in BIND.
Widespread
attacks against the DNS system may lead to general instability and
inaccuracy
of DNS data.
Solution: Upgrade to bind 8.2.7, 8.3.4 or 4.9.11
URLs:
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21469
_*подозрение на существование уязвимости*_
*командная строка и/или DOS-атака*
описание уязвимости:
A buffer overflow vulnerability exists in multiple implementations of
DNS resolver libraries. Operating systems and applications that
utilize vulnerable DNS resolver libraries may be affected. A remote
attacker who is able to send malicious DNS responses could potentially
exploit this vulnerability to execute arbitrary code or cause a denial
of service on a vulnerable system.
Solution : Upgrade to a corrected version of the DNS resolver libraries.
Url:
http://www.cert.org/advisories/CA-2002-19.html
_*подозрение на существование уязвимости*_
*переполнение буфера (shell code)*
описание уязвимости:
Multiple vulnerabilities in various versions
of BIND.
Version 8 of BIND contains a overflow that may be exploitable
to remote attackers. Due to a bug that is present when handling
invalid transaction signatures, it is possible to overwrite some
memory locations with a known value. If the request came in via
the UDP transport then the area partially overwriten is a stack
frame in named. If the request came in via the TCP transport then
the area partically overwriten is in the heap and overwrites
malloc's internal variables. This can be exploited to execute
shellcode with the privileges of named (typically root).
It is believed that most (if not all) versions of BIND in use
contain a vulnerability that may allow an attacker to view
named's memory. This may aid an attacker in further attacks.
The problem occurs in the Compressed Zone Transfer (ZXFR)
functionality of BIND. A default installation of BIND does not
support the transfer of compressed zone files. However, daemon
that allows zone transfers and recursive queries will crash if
queried for a compressed zone transfer that is not in the nameserver
cache. This could result in a name resolution Denial of Service for
all users and systems depending upon
nameservers using the affected software.
Solution: Upgrade.
Patch: Get it from Your vendor
Url:
http://www.securityfocus.com/bid/2302
http://www.securityfocus.com/bid/2321
http://www.securityfocus.com/bid/1923
Hайдено:
- замечаний : /_14_/
- возможных предупреждений : 1
- предупреждений : 6
- потенциальных опасностей : *7*
Затраченное время = 00:37:08
Generated by XSpider 6.50 Christmas Edition (http://www.ptsecurity.ru)
10.07.2003 - 5:17:05
АДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДД Report.txt ДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДДД
Пока, All, счастливого тебе коннекта на 115200!
[VAUT Group] [K-PAX] [LOVE] [MOD] [GTA] [?] [ASM] [PASCAL] [RU.ONANIZM] [RAP]
Winamp Die
--- _VAUT_ _/Station/_
* Origin: CONNECT здесь больше не живет! (2:5030/1081.63)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.nethack/45723f0ccb7e.html, оценка из 5, голосов 10
|