⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 mysql_single_row_subselect_dos.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# kst-gpl#  This script was written by David Maciejak <david dot maciejak at kyxar dot fr>## This script is released under the GNU GPLv2#if(description){ script_id(80075);; script_version ("$Revision: 1.4 $"); script_cve_id("CVE-2007-1420"); 	 script_bugtraq_id(22900); script_xref(name:"OSVDB", value:"33974");  name["english"] = "MySQL Single Row Subselect Remote DoS"; script_name(english:name["english"]); desc["english"] = "Synopsis :The remote database server is prone to a denial of service attack. Description :According to its banner, the version of MySQL on the remote host isolder than 5.0.37.  Such versions are vulnerable to a remote denial ofservice when processing certain single row subselect queries.  Amalicious user can crash the service via a specially-crafted SQLquery. See also :http://www.sec-consult.com/284.htmlhttp://www.securityfocus.com/archive/1/archive/1/462339/100/0/threadedhttp://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-37.htmlSolution : Upgrade to MySQL version 5.0.37 or newer.Risk factor :Medium / CVSS Base Score : 4.9(CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C)"; script_description(english:desc["english"]);  summary["english"] = "Checks the remote MySQL version"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);   script_copyright(english:"This script is Copyright (C) 2007 David Maciejak"); family["english"] = "Databases"; script_family(english:family["english"]); script_dependencie("mysql_version.nasl"); script_require_ports("Services/mysql", 3306); exit(0);}## here the code#include("global_settings.inc");include("misc_func.inc");# Only run the plugin if we're being paranoid to avoid false-positives,# which might arise because the software is open-source.if (report_paranoia < 2) exit(0);port = get_kb_item("Services/mysql");if (!port) port = 3306;if (!get_tcp_port_state(port)) exit(0);ver = get_mysql_version(port:port);if(ver==NULL) exit(0);if(ereg(pattern:"^5\.0\.([0-9]($|[^0-9])|[12][0-9]($|[^0-9])|3[0-6]($|[^0-9]))", string:ver))  security_warning(port);	  

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -