Board logo

标题: 大家看看这两个漏洞怎么利用 [打印本页]

作者: 程序狂人    时间: 2004-10-14 09:54     标题: 大家看看这两个漏洞怎么利用

漏洞 pop3 (110/tcp)
The remote POP3 server might be vulnerable to a buffer overflow
bug when it is issued at least one of these commands, with a too long
argument :
auth
user
pass
If confirmed, this problem might allow an attacker to execute
arbitrary code on the remote system, thus giving him an interactive
session on this host.
Solution : If you do not use POP3, disable this service in /etc/inetd.conf
and restart the inetd process. Otherwise, upgrade to a newer version.
See also : http://online.securityfocus.com/archive/1/27197
Risk factor : High
CVE_ID : CAN-2002-0799, CVE-1999-0822
BUGTRAQ_ID : 789, 790, 830, 894, 942, 1965, 2781, 2811, 4055, 4295, 4614
NESSUS_ID : 10184

漏洞 www (80/tcp)
The remote WebDAV server may be vulnerable to a buffer overflow when
it receives a too long request.
An attacker may use this flaw to execute arbitrary code within the
LocalSystem security context.
*** As safe checks are enabled, Nessus did not actually test for this
*** flaw, so this might be a false positive
Solution : See http://www.microsoft.com/technet/security/bulletin/ms03-007.mspx
Risk Factor : High
CVE_ID : CAN-2003-0109
BUGTRAQ_ID : 7116
NESSUS_ID : 11412
Other references : IAVA:2003-A-0005
作者: 数码鸟    时间: 2004-10-14 15:06     标题: 大家看看这两个漏洞怎么利用

汗,看不懂
作者: bigblock    时间: 2004-10-14 15:09     标题: 大家看看这两个漏洞怎么利用

第一个没什么用处
第二个可以利用溢出
作者: 程序狂人    时间: 2004-10-14 20:31     标题: 大家看看这两个漏洞怎么利用

第二个,用什么工具溢出...
提供几个
感谢




欢迎光临 黑色海岸线论坛 (http://bbs.thysea.com/) Powered by Discuz! 7.2