⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 securecrt_remote_overflow.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
##  This script was written by David Maciejak <david dot maciejak at kyxar dot fr>#  based on work from#  (C) Tenable Network Security##  Ref: Kyuzo <ogl@SirDrinkalot.rm-f.net>##  This script is released under the GNU GPL v2#if(description){ script_id(15822); script_cve_id("CVE-2002-1059"); script_bugtraq_id(5287); if ( defined_func("script_xref") ) script_xref(name:"OSVDB", value:"4991");  script_version("$Revision: 1323 $");   name["english"] = "SecureCRT SSH1 protocol version string overflow"; script_name(english:name["english"]);  desc["english"] = "The remote host is using a vulnerable version of SecureCRT, aSSH/Telnet client built for Microsoft Windows operation systems.It has been reported that SecureCRT contain a remote buffer overflowallowing an SSH server to execute arbitrary command via a speciallylong SSH1 protocol version string.Solution : Upgrade to SecureCRT 3.2.2, 3.3.4, 3.4.6, 4.1 or newerRisk factor : High"; script_description(english:desc["english"]);  summary["english"] = "Determines the version of SecureCRT"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2004 David Maciejak"); family["english"] = "Windows"; script_family(english:family["english"]);  script_dependencies("secpod_reg_enum.nasl"); script_require_keys("SMB/Registry/Enumerated"); script_require_ports(139, 445); exit(0);}version = get_kb_item("SMB/Registry/HKLM/SOFTWARE/VanDyke/SecureCRT/License/Version");if ( ! version ) version = get_kb_item("SMB/Registry/HKLM/SOFTWARE/VanDyke/SecureCRT/Evaluation License/Version");if ( ! version ) exit(0);if (egrep(pattern:"(2\.|3\.([01]|2[^.]|2\.1[^0-9]|3[^.]|3\.[1-3][^0-9]|4[^.]|4\.[1-5][^0-9])|4\.0 beta [12])", string:version))  security_hole(port);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -