CVE-2005-2150
CVSS5.0
发布时间 :2005-07-11 00:00:00
修订时间 :2016-10-17 23:25:15
NMCOPS    

[原文]Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote attackers to (1) list Windows services via svcctl or (2) read eventlogs via eventlog.


[CNNVD]Microsoft Windows MSRPC 信息泄露漏洞(CNNVD-200507-105)

        Microsoft Windows是微软发布的非常流行的操作系统。
        WinNT 4.0及Win2000 SP4 URP1之前版本中存在信息泄露漏洞。
        由于在对匿名管道的处理上存在问题,攻击者可以利用空会话的硬编码命名管道及MSRPC属性匿名读取远程系统的应用程序和系统的事件日志。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_2000Microsoft Windows 2000
cpe:/o:microsoft:windows_nt:4.0Microsoft Windows NT 4.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2150
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2150
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200507-105
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=112076409813099&w=2
(UNKNOWN)  BUGTRAQ  20050707 NULL sessions vulnerabilities using alternate named pipes
http://securitytracker.com/id?1014417
(UNKNOWN)  SECTRACK  1014417
http://www.hsc.fr/ressources/presentations/null_sessions/
(UNKNOWN)  MISC  http://www.hsc.fr/ressources/presentations/null_sessions/
http://www.securityfocus.com/bid/14177
(UNKNOWN)  BID  14177
http://www.securityfocus.com/bid/14178
(UNKNOWN)  BID  14178
http://xforce.iss.net/xforce/xfdb/21286
(UNKNOWN)  XF  win-name-pipe-null-information-disclosure(21286)
http://xforce.iss.net/xforce/xfdb/21288
(UNKNOWN)  XF  win-pipe-null-eventlog-information-disclosure(21288)

- 漏洞信息

Microsoft Windows MSRPC 信息泄露漏洞
中危 设计错误
2005-07-11 00:00:00 2005-10-20 00:00:00
远程  
        Microsoft Windows是微软发布的非常流行的操作系统。
        WinNT 4.0及Win2000 SP4 URP1之前版本中存在信息泄露漏洞。
        由于在对匿名管道的处理上存在问题,攻击者可以利用空会话的硬编码命名管道及MSRPC属性匿名读取远程系统的应用程序和系统的事件日志。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://support.microsoft.com/kb/842209

- 漏洞信息 (F38530)

nullsessions.txt (PacketStormID:F38530)
2005-07-07 00:00:00
Jean-Baptiste Marchand  hsc.fr
advisory,remote
windows,2k,nt
CVE-2005-2150
[点击下载]

By taking advantage of hardcoded named pipes allowed for NULL sessions and using the property of MSRPC that, by default, all available RPC interfaces in a process can be reached using any opened endpoint, it is possible to anonymously enumerate Windows services and read the Application and System eventlogs of a remote Windows NT 4.0 or Windows 2000 system.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

	   NULL sessions vulnerabilities using alternate named pipes 


		  Herv    

- 漏洞信息

17859
Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-07-07 2004-01-23
2005-07-07 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch (URP1 for Windows 2000 Service Pack 4) to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft Windows MSRPC Eventlog Information Disclosure Vulnerability
Design Error 14178
Yes No
2005-07-07 12:00:00 2009-07-12 04:06:00
Discovery is credited to Jean-Baptiste Marchand and Herv Schauer Consultants team.

- 受影响的程序版本

Microsoft Windows NT Workstation 4.0 SP6a
Microsoft Windows NT Workstation 4.0 SP6
Microsoft Windows NT Workstation 4.0 SP5
Microsoft Windows NT Workstation 4.0 SP4
Microsoft Windows NT Workstation 4.0 SP3
Microsoft Windows NT Workstation 4.0 SP2
Microsoft Windows NT Workstation 4.0 SP1
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Terminal Server 4.0 SP6a
Microsoft Windows NT Terminal Server 4.0 SP6
Microsoft Windows NT Terminal Server 4.0 SP5
Microsoft Windows NT Terminal Server 4.0 SP4
Microsoft Windows NT Terminal Server 4.0 SP3
Microsoft Windows NT Terminal Server 4.0 SP2
Microsoft Windows NT Terminal Server 4.0 SP1
Microsoft Windows NT Terminal Server 4.0
Microsoft Windows NT Server 4.0 SP6a
+ Avaya DefinityOne Media Servers
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
+ Avaya S8100 Media Servers 0
Microsoft Windows NT Server 4.0 SP6
Microsoft Windows NT Server 4.0 SP5
Microsoft Windows NT Server 4.0 SP4
Microsoft Windows NT Server 4.0 SP3
Microsoft Windows NT Server 4.0 SP2
Microsoft Windows NT Server 4.0 SP1
Microsoft Windows NT Server 4.0
Microsoft Windows NT Enterprise Server 4.0 SP6a
Microsoft Windows NT Enterprise Server 4.0 SP6
Microsoft Windows NT Enterprise Server 4.0 SP5
Microsoft Windows NT Enterprise Server 4.0 SP4
Microsoft Windows NT Enterprise Server 4.0 SP3
Microsoft Windows NT Enterprise Server 4.0 SP2
Microsoft Windows NT Enterprise Server 4.0 SP1
Microsoft Windows NT Enterprise Server 4.0
Microsoft Windows 2000 Server SP4
Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
+ Avaya DefinityOne Media Servers
+ Avaya IP600 Media Servers
+ Avaya S3400 Message Application Server 0
+ Avaya S8100 Media Servers 0
Microsoft Windows 2000 Professional SP4
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP4
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server SP4
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server
Microsoft .NET Framework 1.0

- 漏洞讨论

Microsoft Windows allows remote attackers to disclose the application or system eventlog of an affected computer. This issue may be exploited using hardcoded named pipes allowed for NULL sessions combined with eventlog interface and Microsoft Remote Procedure Call framework (MSRPC).

Information gathered through the exploitation of this issue may aid in other attacks.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Microsoft has released various knowledge base articles to address issues in Windows 2000. Please see the articles in Web references for more information. Update Rollup 1 for Windows 2000 SP4 is available as a fix for Windows 2000 Service Pack 4.


Microsoft Windows 2000 Advanced Server SP4

Microsoft Windows 2000 Datacenter Server SP4

Microsoft Windows 2000 Server SP4

Microsoft Windows 2000 Professional SP4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站