>受影响的版本:
Windows Server 2003 (Internet Explorer 6.0)
漏洞观察:
Windows Server 2003的这个漏洞会致使远程攻击者篡改注册表"Shell Folders"目录,从而无需任何登陆认证,轻易获得系统文件夹中%USERPROFILE%文件的访问权。
ex.) %USERPROFILE% = "C:Documents and Settings%USERNAME%"
详细资料:
远程攻击者篡改Windows Server 2003系统注册表中的"Shell Folders"目录,通过"shell:[Shell Folders].." 将本地文件与恶意程序链接。
[Shell Folders]
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders
AppData: "C:Documents and Settings%USERNAME%Application Data"
Cookies: "C:Documents and Settings%USERNAME%Cookies"
Desktop: "C:Documents and Settings%USERNAME%Desktop"
Favorites: "C:Documents and Settings%USERNAME%Favorites"
NetHood: "C:Documents and Settings%USERNAME%NetHood"
Personal: "C:Documents and Settings%USERNAME%My Documents"
PrintHood: "C:Documents and Settings%USERNAME%PrintHood"
Recent: "C:Documents and Settings%USERNAME%Recent"
SendTo: "C:Documents and Settings%USERNAME%SendTo"
Start Menu: "C:Documents and Settings%USERNAME%Start Menu"
Templates: "C:Documents and Settings%USERNAME%Templates"
Programs: "C:Documents and Settings%USERNAME%Start MenuPrograms"
Startup: "C:Documents and Settings%USERNAME%Start MenuProgramsStartup"
Local Settings: "C:Documents and Settings%USERNAME%Local Settings"
Local AppData: "C:Documents and Settings%USERNAME%Local SettingsApplication Data"
Cache: "C:Documents and Settings%USERNAME%Local SettingsTemporary Internet Files"
History: "C:Documents and Settings%USERNAME%Local SettingsHistory"
My Pictures: "C:Documents and Settings%USERNAME%My DocumentsMy Pictures"
Fonts: "C:WINDOWSFonts"
My Music: "C:Documents and Settings%USERNAME%My DocumentsMy Music"
My Video: "C:Documents and Settings%USERNAME%My DocumentsMy Videos"
CD Burning: "C:Documents and Settings%USERNAME%Local SettingsApplication
DataMicrosoftCD Burning"
Administrative Tools: "C:Documents and Settings%USERNAME%Start
MenuProgramsAdministrative Tools"
恶意代码示例:
**************************************************
This exploit reads %TEMP%exploit.html.
You need to create it.
And click on the malicious link.
**************************************************
Malicious link:
Exploit
微软举措:
微软已于2003年6月9日发布了此漏洞公告,计划于下一个版本的windows补丁中添加此漏洞的修补程序。
文章来源:金山毒霸编译 (编辑:威海站长网)
【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容!
|