⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 secpod_ms08-063_900053.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################  SMB Remote Code Execution Vulnerability (957095)##  Copyright: SecPod##  Date Written: 2008/10/15##  Revision: 1.1##  Log: schandan#  Issue #0334#  ------------------------------------------------------------------------#  This program was written by SecPod and is licensed under the GNU GPL#  license. Please refer to the below link for details,#  http://www.gnu.org/licenses/gpl.html#  This header contains information regarding licensing terms under the GPL,#  and information regarding obtaining source code from the Author.#  Consequently, pursuant to section 3(c) of the GPL, you must accompany the#  information found in this header with any distribution you make of this#  Program.#  ------------------------------------------------------------------------##############################################################################if(description){  script_id(900053);  script_bugtraq_id(31647);  script_cve_id("CVE-2008-4038");  script_copyright(english:"Copyright (C) 2008 SecPod");  script_version("Revision: 1.0");  script_category(ACT_GATHER_INFO);  script_family(english:"Windows");  script_name(english:"SMB Remote Code Execution Vulnerability (957095)");  script_summary(english:"Check for Hotfix and version of SMB");  desc["english"] = "  MS08-063  Overview: This host has critical security update missing according to  Microsoft Bulletin MS08-063.  Vulnerability Insight:  The issue is caused due to an input validation error in the handling of  file names in the Microsoft SMB (Server Message Block) protocol.  Impact: Successful exploitation could allow remote attackers to cause  a buffer underflow.  Impact Level: System/Network  Affected Software/OS:  Microsoft Windows 2K Service Pack 4 and prior.  Microsoft Windows XP Service Pack 3 and prior.  Microsoft Windows 2003 Service Pack 2 and prior.  Fix: Run Windows Update and update the listed hotfixes or download and  update mentioned hotfixes in the advisory from the below link,  http://www.microsoft.com/technet/security/bulletin/ms08-063.mspx  References: http://www.microsoft.com/technet/security/bulletin/ms08-063.mspx  CVSS Score:    CVSS Base Score     : 7.1 (AV:N/AC:M/Au:NR/C:N/I:N/A:C)    CVSS Temporal Score : 5.3  Risk factor : High";  script_description(english:desc["english"]);  script_dependencies("secpod_reg_enum.nasl");  exit(0);}include("smb_nt.inc");include("secpod_reg.inc");include("secpod_smb_func.inc");if(hotfix_check_sp(win2k:5, xp:4, win2003:3) <= 0){  exit(0);}# Check Hotfix Missing 957095 (MS08-063)if(hotfix_missing(name:"957095") == 0){  exit(0);}sysPath = registry_get_sz(key:"SOFTWARE\Microsoft\COM3\Setup",                          item:"Install Path");if(!sysPath){  exit(0);}share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:sysPath);file =  ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1",                     string:sysPath + "\drivers\Srv.sys");sysVer = GetVer(file:file, share:share);if(!sysVer){  exit(0);}# Windows 2Kif(hotfix_check_sp(win2k:5) > 0){  # Grep for Srv.sys version < 5.0.2195.7177  if(egrep(pattern:"^5\.0\.2195\.([0-6]?[0-9]?[0-9]?[0-9]|7(0[0-9][0-9]|" +                   "1[0-6][0-9]|17[0-6]))$", string:sysVer)){    security_hole(0);  }  exit(0);}# Windows XPif(hotfix_check_sp(xp:4) > 0){  SP = get_kb_item("SMB/WinXP/ServicePack");  if("Service Pack 2" >< SP)  {    # Grep for Srv.sys < 5.1.2600.3436    if(egrep(pattern:"^5\.1\.2600\.([0-2]?[0-9]?[0-9]?[0-9]|3([0-3][0-9][0-9]|" +                     "4([0-2][0-9]|3[0-5])))$", string:sysVer)){       security_hole(0);    }    exit(0);  }  else if("Service Pack 3" >< SP)  {    # Grep for Srv.sys < 5.1.2600.5671    if(egrep(pattern:"^5\.1\.2600\.([0-4]?[0-9]?[0-9]?[0-9]|5([0-5][0-9][0-9]|" +                     "6([0-6][0-9]|70)))$", string:sysVer)){       security_hole(0);    }    exit(0);  }  security_hole(0);}# Windows 2003if(hotfix_check_sp(win2003:3) > 0){  SP = get_kb_item("SMB/Win2003/ServicePack");  if("Service Pack 1" >< SP)  {    # Grep for Srv.sys version < 5.2.3790.3200    if(egrep(pattern:"^5\.2\.3790\.([0-2]?[0-9]?[0-9]?[0-9]|3[01][0-9][0-9])$",             string:sysVer)){       security_hole(0);    }    exit(0);  }  else if("Service Pack 2" >< SP)  {    # Grep for Srv.sys version < 5.2.3790.4363    if(egrep(pattern:"^5\.2\.3790\.([0-3]?[0-9]?[0-9]?[0-9]|4([0-2][0-9][0-9]|" +                     "3([0-5][0-9]|6[0-2])))$", string:sysVer)){       security_hole(0);    }    exit(0);  }  security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -