⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 smb_xp_ms01-059.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## This script was written by Michael Scheidell <scheidell at secnap.net>## See the Nessus Scripts License for details#if(description){ script_id(10835); script_bugtraq_id(3723); script_version("$Revision: 1323 $"); script_cve_id("CVE-2001-0876"); name["english"] = "Unchecked Buffer in XP upnp";  script_name(english:name["english"]);  desc["english"] = "Unchecked Buffer in Universal Plug and Play CanLead to System Compromise for Windows XP (Q315000)By sending a specially-malformed NOTIFY directive,it would be possible for an attacker to cause codeto run in the context of the UPnP service, whichruns with system privileges on Windows XP.The UPnP implementations do not adequatelyregulate how it performs this operation, and thisgives rise to two different denial-of-servicescenarios. (CVE-2001-0877)See http://www.microsoft.com/technet/security/bulletin/ms01-059.mspxRisk factor : High"; script_description(english:desc["english"]);  summary["english"] = "Determines whether the hotfix Q315000 is installed"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2002 Michael Scheidell"); family["english"] = "Windows : Microsoft Bulletins"; script_family(english:family["english"]);  script_dependencies("secpod_reg_enum.nasl"); script_require_keys("SMB/Registry/Enumerated"); exit(0);}include("secpod_reg.inc");if ( hotfix_check_sp(xp:1) <= 0 ) exit(0);if ( hotfix_missing(name:"Q315000") > 0 )	security_hole(get_kb_item("SMB/transport"));

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -