📄 secpod_ms08-063_900053.nasl
字号:
################################################################################ SMB Remote Code Execution Vulnerability (957095)## Copyright: SecPod## Date Written: 2008/10/15## Revision: 1.1## Log: schandan# Issue #0334# ------------------------------------------------------------------------# This program was written by SecPod and is licensed under the GNU GPL# license. Please refer to the below link for details,# http://www.gnu.org/licenses/gpl.html# This header contains information regarding licensing terms under the GPL,# and information regarding obtaining source code from the Author.# Consequently, pursuant to section 3(c) of the GPL, you must accompany the# information found in this header with any distribution you make of this# Program.# ------------------------------------------------------------------------##############################################################################if(description){ script_id(900053); script_bugtraq_id(31647); script_cve_id("CVE-2008-4038"); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.0"); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_name(english:"SMB Remote Code Execution Vulnerability (957095)"); script_summary(english:"Check for Hotfix and version of SMB"); desc["english"] = " MS08-063 Overview: This host has critical security update missing according to Microsoft Bulletin MS08-063. Vulnerability Insight: The issue is caused due to an input validation error in the handling of file names in the Microsoft SMB (Server Message Block) protocol. Impact: Successful exploitation could allow remote attackers to cause a buffer underflow. Impact Level: System/Network Affected Software/OS: Microsoft Windows 2K Service Pack 4 and prior. Microsoft Windows XP Service Pack 3 and prior. Microsoft Windows 2003 Service Pack 2 and prior. Fix: Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://www.microsoft.com/technet/security/bulletin/ms08-063.mspx References: http://www.microsoft.com/technet/security/bulletin/ms08-063.mspx CVSS Score: CVSS Base Score : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C) CVSS Temporal Score : 5.3 Risk factor : High"; script_description(english:desc["english"]); script_dependencies("secpod_reg_enum.nasl"); exit(0);}include("smb_nt.inc");include("secpod_reg.inc");include("secpod_smb_func.inc");if(hotfix_check_sp(win2k:5, xp:4, win2003:3) <= 0){ exit(0);}# Check Hotfix Missing 957095 (MS08-063)if(hotfix_missing(name:"957095") == 0){ exit(0);}sysPath = registry_get_sz(key:"SOFTWARE\Microsoft\COM3\Setup", item:"Install Path");if(!sysPath){ exit(0);}share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:sysPath);file = ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1", string:sysPath + "\drivers\Srv.sys");sysVer = GetVer(file:file, share:share);if(!sysVer){ exit(0);}# Windows 2Kif(hotfix_check_sp(win2k:5) > 0){ # Grep for Srv.sys version < 5.0.2195.7177 if(egrep(pattern:"^5\.0\.2195\.([0-6]?[0-9]?[0-9]?[0-9]|7(0[0-9][0-9]|" + "1[0-6][0-9]|17[0-6]))$", string:sysVer)){ security_hole(0); } exit(0);}# Windows XPif(hotfix_check_sp(xp:4) > 0){ SP = get_kb_item("SMB/WinXP/ServicePack"); if("Service Pack 2" >< SP) { # Grep for Srv.sys < 5.1.2600.3436 if(egrep(pattern:"^5\.1\.2600\.([0-2]?[0-9]?[0-9]?[0-9]|3([0-3][0-9][0-9]|" + "4([0-2][0-9]|3[0-5])))$", string:sysVer)){ security_hole(0); } exit(0); } else if("Service Pack 3" >< SP) { # Grep for Srv.sys < 5.1.2600.5671 if(egrep(pattern:"^5\.1\.2600\.([0-4]?[0-9]?[0-9]?[0-9]|5([0-5][0-9][0-9]|" + "6([0-6][0-9]|70)))$", string:sysVer)){ security_hole(0); } exit(0); } security_hole(0);}# Windows 2003if(hotfix_check_sp(win2003:3) > 0){ SP = get_kb_item("SMB/Win2003/ServicePack"); if("Service Pack 1" >< SP) { # Grep for Srv.sys version < 5.2.3790.3200 if(egrep(pattern:"^5\.2\.3790\.([0-2]?[0-9]?[0-9]?[0-9]|3[01][0-9][0-9])$", string:sysVer)){ security_hole(0); } exit(0); } else if("Service Pack 2" >< SP) { # Grep for Srv.sys version < 5.2.3790.4363 if(egrep(pattern:"^5\.2\.3790\.([0-3]?[0-9]?[0-9]?[0-9]|4([0-2][0-9][0-9]|" + "3([0-5][0-9]|6[0-2])))$", string:sysVer)){ security_hole(0); } exit(0); } security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -