⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 secpod_ms08-037_900005.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################  Vulnerabilities in DNS Could Allow Spoofing (953230)##  Copyright: SecPod##  Date Written: 2008/07/09##  Revision: 1.3 ##  Log:#  Issue #0009  schandan#  ------------------------------------------------------------------------#  This program was written by SecPod and is licensed under the GNU GPL #  license. Please refer to the below link for details,#  http://www.gnu.org/licenses/gpl.html#  This header contains information regarding licensing terms under the GPL, #  and information regarding obtaining source code from the Author. #  Consequently, pursuant to section 3(c) of the GPL, you must accompany the #  information found in this header with any distribution you make of this #  Program.#  ------------------------------------------------------------------------##############################################################################if(description){ script_id(900005); script_bugtraq_id(30132); script_cve_id("CVE-2008-1447", "CVE-2008-1454"); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.3 "); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_name(english:"Vulnerabilities in DNS Could Allow Spoofing (953230)"); script_summary(english:"Check for Hotfix 953230 and file version"); desc["english"] = " Overview : This host is missing critical security update according to Microsoft Bulletin MS08-037. Vulnerability Insight :	The flaws exist due to the DNS protocol fail to provide an adequate        amount of entropy when performing DNS queries for Transaction ID         and Source Port parameters that can be exploited to poison the          DNS cache by inserting responses records into the DNS server or        client cache.        Impact : Successful execution of exploit could allow unauthenticated        attackers to retrieve sensitive information and will redirect internet        traffic to any server of the attacker's choosing. Impact Level : SYSTEM Affected Software/OS: - DNS Client/Server on Windows (All). Fix : Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link. http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx References : http://secunia.com/advisories/30925/	      http://www.kb.cert.org/vuls/id/800113 	      http://securitytracker.com/alerts/2008/Jul/1020438.html              http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx CVSS Score Report :        CVSS Base Score     : 7.5 (AV:N/AC:L/Au:NR/C:P/I:P/A:P)        CVSS Temporal Score : 6.2  Risk factor : High"; script_description(english:desc["english"]); script_dependencies("secpod_reg_enum.nasl"); exit(0);} include("smb_nt.inc"); include("secpod_reg.inc"); if(hotfix_check_sp(win2k:5, xp:4, win2003:3) <= 0){        exit(0); } function Get_FileVersion() {	sysFile = registry_get_sz(key:"SOFTWARE\Microsoft\COM3\Setup",                           item:"Install Path");	if(!sysFile){		exit(0);	}	sysFile += "\drivers\Tcpip.sys";	share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:sysFile); 	file =  ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1", string:sysFile);        name    =  kb_smb_name();        login   =  kb_smb_login();        pass    =  kb_smb_password();        domain  =  kb_smb_domain();        port    =  kb_smb_transport();        soc = open_sock_tcp(port);        if(!soc){                exit(0);        }        r = smb_session_request(soc:soc, remote:name);        if(!r)        {                close(soc);                exit(0);        }        prot = smb_neg_prot(soc:soc);        if(!prot)        {                close(soc);                exit(0);        }        r = smb_session_setup(soc:soc, login:login, password:pass,                              domain:domain, prot:prot);        if(!r)        {                close(soc);                exit(0);        }        uid = session_extract_uid(reply:r);        r = smb_tconx(soc:soc, name:name, uid:uid, share:share);        tid = tconx_extract_tid(reply:r);        if(!tid)        {                close(soc);                exit(0);        }        fid = OpenAndX(socket:soc, uid:uid, tid:tid, file:file);        if(!fid)        {                close(soc);                exit(0);        } 	fsize = smb_get_file_size(socket:soc, uid:uid, tid:tid, fid:fid); 	off = fsize - 90000; 	while(fsize != off) 	{        	data = ReadAndX(socket:soc, uid:uid, tid:tid, count:16384, off:off);        	data = str_replace(find:raw_string(0), replace:"", string:data);        	version = strstr(data, "ProductVersion");        	if(!version){                	off += 16383;        	}        	else break; 	} 	if(!version){        	exit(0); 	}	v = ""; 	for(i = strlen("ProductVersion"); i < strlen(version); i++) 	{        	if((ord(version[i]) < ord("0") ||            	    ord(version[i]) > ord("9")) && version[i] != "."){                	break;        	}        	else                	v += version[i]; 	}	return (v); } # Check for DNS Client and DNS Server if(!registry_key_exists(key:"SYSTEM\CurrentControlSet\Services\Dnscache") &&    !registry_key_exists(key:"SYSTEM\CurrentControlSet\Services\DNS")){        exit(0); } if(hotfix_missing(name:"953230") == 0){	exit(0); } fileVer = Get_FileVersion(); if(!fileVer){	exit(0); } if(hotfix_check_sp(win2k:5) > 0) { 	# Check for version < 5.0.2195.7162        if(egrep(pattern:"^5\.0?0\.(([01]?[0-9]?[0-9]?[0-9]|2(0[0-9" +                         "][0-9]|1([0-8][0-9]|9[0-4])))\..*|2195\.(" +                         "[0-6]?[0-9]?[0-9]?[0-9]|7(0[0-9][0-9]|1[0" +                         "-5][0-9]|16[01])))$", string:fileVer)){        	security_warning(0);        }        exit(0); } else if(hotfix_check_sp(xp:4) > 0) {        SP = get_kb_item("SMB/WinXP/ServicePack");        if("Service Pack 2" >< SP)        {		# Check for version < 5.1.2600.3394                if(egrep(pattern:"^5\.0?1\.(([01]?[0-9]?[0-9]?[0-9]|2([0-5][0" +                                 "-9][0-9]))\..*|2600\.([0-2]?[0-9]?[0-9]?[" +                                 "0-9]|3([0-2][0-9][0-9]|3[0-8][0-9]|39[0-3])))$",                         string:fileVer)){                        security_warning(0);                }                exit(0);        }        else if("Service Pack 3" >< SP)        {		# Check for version < 5.1.2600.5625                if(egrep(pattern:"^5\.0?1\.(([01]?[0-9]?[0-9]?[0-9]|2([0-5][0" +                                 "-9][0-9]))\..*|2600\.([0-4]?[0-9]?[0-9]?[" +                                 "0-9]|5([0-5][0-9][0-9]|6[01][0-9]|62[0-4])))$",                         string:fileVer)){                        security_warning(0);                }                exit(0);        }	security_warning(0); } else if(hotfix_check_sp(win2003:3) > 0) { 	SP = get_kb_item("SMB/Win2003/ServicePack");        if("Service Pack 1" >< SP)        {        	# Check for version < 5.2.3790.3161                if(egrep(pattern:"^5\.0?2\.(([0-2]?[0-9]?[0-9]?[0-9]|3([0-6]" +				 "[0-9][0-9]|7[0-8][0-9]))\..*|3790\.([0-2]?" +				 "[0-9]?[0-9]?[0-9]|30[0-9][0-9]|31([0-5][0-9]|60)))$",                         string:fileVer)){                	security_warning(0);                }                exit(0);        }        else if("Service Pack 2" >< SP)        {        	# Check for version < 5.2.3790.4318                if(egrep(pattern:"^5\.0?2\.(([02]?[0-9]?[0-9]?[0-9]|3([0-6]" +			         "[0-9][0-9]|7[0-8][0-9]))\..*|3790\.([0-3]?" +				 "[0-9]?[0-9]?[0-9]|4([0-2][0-9][0-9]|3(0" +				 "[0-9]|1[0-7]))))$", string:fileVer)){                	security_warning(0);                }                exit(0);        }	security_warning(0); }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -