PDA

View Full Version : www.viethacker.com bug lol



yuna_admirer
08-05-2003, 17:36
Đây là phân tích dựa trên hệ thống là chính:

Domain : www.viethacker.com
Map : fc203069.fl.FreeBit.NE.JP
IP : 43.244.203.69 ( Range của Nhật Bản - tham khảo IANA)

Số port mở

7: Echo
21: FTP
22: SSH -secure shell - Rlogin
53: DNS
80: WEB
113: IDENT- Authentication service
199: SMUX-SMUX
3306: MySQL
5680: CANNA (Jap-input)
8080: Generic - Shared service port / HTTP Alternate
22273: WNN6 - Wnn6 (Jap. Input)

Các Exploit

1st

Dns Services: TCP:53 - BIND 9 resolver buffer overflow

A buffer overflow in libbind and libc can be exploited by an attacker to gain remote access to any server that uses these vulnerable resolver implimentations. BIND up to 9.2.1, Sendmail, and most a unices are vulnerable, to name a few.

Related link :

http://www.cert.org/advisories/CA-2002-19.html[/i]

2nd

SSH Servers: TCP:22 - OpenSSH 3.3 PAMAuth Integer Overflow

[i]Several versions of the OpenSSH sshd between 1.2.2 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation.

Related Link

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0640[i]

Còn 3-5 lổi nhỏ, nhưng mức độ bình thường.


Lổi được scan bằng Retina + ThreatScanner (Hardware)