Microsoft Windows DCOM RPC接口长主机名远程缓冲区溢出漏洞(MS03-026)

漏洞信息详情

Microsoft Windows DCOM RPC接口长主机名远程缓冲区溢出漏洞(MS03-026)

漏洞简介

Remote Procedure Call (RPC)是Windows操作系统使用的一种远程过程调用协议,RPC提供进程间交互通信机制,允许在某台计算机上运行的程序无缝地在远程系统上执行代码。协议本身源自OSF RPC协议,但增加了Microsoft特定的扩展。
Microsoft的RPC部分在通过TCP/IP处理信息交换时存在问题,远程攻击者可以利用这个漏洞以本地系统权限在系统上执行任意指令。
此漏洞是由于不正确处理畸形消息所致,漏洞影响使用RPC的DCOM接口。此接口处理由客户端机器发送给服务器的DCOM对象激活请求(如UNC路径)。攻击者成功利用此漏洞可以以本地系统权限执行任意指令。攻击者可以在系统上执行任意操作,如安装程序、查看或更改、删除数据或建立系统管理员权限的帐户。
要利用这个漏洞,攻击者需要发送特殊形式的请求到远程机器上的135端口。

漏洞公告

临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* 使用防火墙过滤系统的服务端口,使不可信主机无法访问。该漏洞影响的操作系统范围包括Windows NT/2000/XP/2003,使用Windows 95/98/ME的用户不受该问题的影响。由于漏洞是利用Windows的DCOM RPC接口的弱点侵害系统,而在Windows系统中可以进行RPC调用的端口至少包括:

135/TCP epmap DCE endpoint resolution

135/UDP epmap DCE endpoint resolution

139/TCP netbios-ssn NETBIOS Session Service

139/UDP netbios-ssn NETBIOS Session Service

445/TCP microsoft-ds Win2k+ Server Message Block

445/UDP microsoft-ds Win2k+ Server Message Block

593/TCP http-rpc-epmap HTTP RPC Ep Map

593/UDP http-rpc-epmap HTTP RPC Ep Map
厂商补丁:
Microsoft
———
Microsoft已经为此发布了一个安全公告(MS03-026)以及相应补丁:

MS03-026:Buffer Overrun In RPC Interface Could Allow Code Execution(Q823980)

链接:http://www.microsoft.com/technet/security/bulletin/MS03-026.asp” target=”_blank”>
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

补丁下载:

Windows NT 4.0 Server:

http://microsoft.com/downloads/details.aspx?FamilyId=2CC66F4E-217E-4FA7-BDBF-DF77A0B9303F&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=2CC66F4E-217E-4FA7-BDBF-DF77A0B9303F&displaylang=en

Windows NT 4.0 Terminal Server Edition :

http://microsoft.com/downloads/details.aspx?FamilyId=6C0F0160-64FA-424C-A3C1-C9FAD2DC65CA&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=6C0F0160-64FA-424C-A3C1-C9FAD2DC65CA&displaylang=en

Windows 2000:

http://microsoft.com/downloads/details.aspx?FamilyId=C8B8A846-F541-4C15-8C9F-220354449117&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=C8B8A846-F541-4C15-8C9F-220354449117&displaylang=en

Windows XP 32 bit Edition:

http://microsoft.com/downloads/details.aspx?FamilyId=2354406C-C5B6-44AC-9532-3DE40F69C074&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=2354406C-C5B6-44AC-9532-3DE40F69C074&displaylang=en

Windows XP 64 bit Edition:

http://microsoft.com/downloads/details.aspx?FamilyId=1B00F5DF-4A85-488F-80E3-C347ADCC4DF1&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=1B00F5DF-4A85-488F-80E3-C347ADCC4DF1&displaylang=en

Windows Server 2003 32 bit Edition:

http://microsoft.com/downloads/details.aspx?FamilyId=F8E0FF3A-9F4C-4061-9009-3A212458E92E&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=F8E0FF3A-9F4C-4061-9009-3A212458E92E&displaylang=en

Windows Server 2003 64 bit Edition:

http://microsoft.com/downloads/details.aspx?FamilyId=2B566973-C3F0-4EC1-995F-017E35692BC7&displaylang=en” target=”_blank”>
http://microsoft.com/downloads/details.aspx?FamilyId=2B566973-C3F0-4EC1-995F-017E35692BC7&displaylang=en

参考网址

来源:US-CERT Vulnerability Note: VU#568148
名称: VU#568148
链接:http://www.kb.cert.org/vuls/id/568148

来源:CERT/CC Advisory: CA-2003-19
名称: CA-2003-19
链接:http://www.cert.org/advisories/CA-2003-19.html

来源:CERT/CC Advisory: CA-2003-16
名称: CA-2003-16
链接:http://www.cert.org/advisories/CA-2003-16.html

来源: XF
名称: win-rpc-dcom-bo(12629)
链接:http://xforce.iss.net/xforce/xfdb/12629

来源: BID
名称: 8205
链接:http://www.securityfocus.com/bid/8205

来源: www.xfocus.org
链接:http://www.xfocus.org/documents/200307/2.html

来源: MS
名称: MS03-026
链接:http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

来源: FULLDISC
名称: 20030730 rpcdcom Universal offsets
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/007357.html

来源: FULLDISC
名称: 20030726 Re: The French BUGTRAQ (New Win RPC Exploit)
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/007079.html

来源: BUGTRAQ
名称: 20030725 The Analysis of LSD’s Buffer Overrun in Windows RPC Interface(code revised )
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=105914789527294&w=2

来源: BUGTRAQ
名称: 20030716 [LSD] Critical security vulnerability in Microsoft Operating Systems
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=105838687731618&w=2

来源: US Government Resource: oval:org.mitre.oval:def:296
名称: oval:org.mitre.oval:def:296
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:296

来源: US Government Resource: oval:org.mitre.oval:def:2343
名称: oval:org.mitre.oval:def:2343
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2343

来源: US Government Resource: oval:org.mitre.oval:def:194
名称: oval:org.mitre.oval:def:194
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:194

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享