smb_nt_ms02-072.nasl
来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 60 行
NASL
60 行
## This script was written by Michael Scheidell SECNAP Network Security## See the Nessus Scripts License for detailsif(description){ script_id(11194); script_bugtraq_id(6427); script_cve_id("CAN-2002-1327"); script_version("$Revision: 1323 $"); name["english"] = "Unchecked Buffer in XP Shell Could Enable System Compromise (329390)"; script_name(english:name["english"]); desc["english"] = "It is possible for a malicious user to mount a bufferoverrun attack using windows XP shell.A successful attack could have the effect of either causingthe Windows Shell to fail, or causing an attacker's code to run onthe user's computer in the security context of the user.Maximum Severity Rating: Critical Recommendation: Administrators should install the patch immediately. Affected Software: Microsoft Windows XP.Seehttp://www.microsoft.com/technet/security/bulletin/ms02-072.mspxRisk factor : High"; script_description(english:desc["english"]); summary["english"] = "Checks for MS Hotfix 329390, Flaw in Microsoft XP Shell"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2002 SECNAP Network Security, LLC"); family["english"] = "Windows : Microsoft Bulletins"; script_family(english:family["english"]); script_dependencies("secpod_reg_enum.nasl"); script_require_keys("SMB/Registry/Enumerated"); exit(0);}include("secpod_reg.inc");if ( hotfix_check_sp(xp:2) <= 0 ) exit(0);if ( hotfix_missing(name:"Q329390") > 0 ) security_hole(get_kb_item("SMB/transport"));
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?