Common Security Exploit and Vulnerability Matrix
Total Page:16
File Type:pdf, Size:1020Kb
Common Security Exploit and Vulnerability Matrix cfingerd a web document can execute Microsoft JET 3.5X commands on the client workstation /var/opt/SUNWconn/ldap/log/ IIS script can capture domain *.asp 80 tcp slapd.log remote buffer overflow - passwords via AUTH_PASSWORD variable local user can link .forward, execute arbitrary code .plan, or .project and fingerd Excel CALL statement can call any Stores cleartext passwords will read linked file as uid 0 DLL function buffer overflow in cookie Excel SIMS/SDS world readable (i.e., read /etc/shadow file, etc) Document *.xls Excel Scripting Engine asp dot bug tcp/ip Application Apache shows raw source asp interpreter /etc/shadow Excel Scripting Engine Uses Protocol user@host@host redirection cleartext .plan Excel Document *.xls 22 tcp passwords 4000 udp rpcbind .@host reveals users who have never logged in anyform cgi rusers files not in web root !(c:\inetpub\wwwroot\*) 1024- some versions of rpcbind will udp fingerd reveal logged on users GNU fingerd execute any command 2000 cachemgr.cgi from remote listen on ports other than RPC service will leak MDAC RDS unauthenticated remote user information asp pages can access files 0@ reveals users who have never send user#999999 111, and possibly defeat any Cmail 2.3 traffic ICQ\NewDB\uin#.dat cachemgr_passwd formmail cgi including source addresses user.db not in web root 110 tcp pop3 logged in overflow firewall port filtering pseudoencrypts DataFactory of remote users. (allow parent paths) password is sent in cleartext password is stored in passwords into object 112 tcp auth cleartext and file is will proxy port connections guestbook user.db file /winnt/system32/fm20.dll Wingate world readable can be used to find sgi_fam Eudora scripting ? udp Forms 2.0 Control can paste user stores cleartext password in vulnerable RPC services 53 dns script access permissions virtual site tunnel ODBC requests through IP Packet clipboard ICQ\NewDB\uin#.dat MDAC, bypass firewalls engine Active X can access other virtual sites content phf remote attacker can get What is a content based 79 tcp finger overflow filename window to give user (IIS 3.0 and misconfigured IIS 4.0 complete list of files & Dr. Watson Log File FileSystemObject sequence numbers ICQ can view any file on target directories on target invalid information about file ODBCJT32.DLL servers) (Scripting.FileSystemObject, attack? alter filesystem easily guessable OpenTextFile) rstatd can use shell() VBA command to execute 80 tcp http extension. Could be used to cause ConSeal PC trojan files to be executed. arbitrary commands from remote. Get root email attachment Servers may perform analysis of incoming data. leaks /winnt/system32/msdxm test-cgi access Dr. Watson on server. trojan a hostile applet or script Many times they will have interpreters that read 8080 80 tcp list files anywhere on machine information SSH tcp log File (may contain incoming data and perform tasks based upon Firewall log in without password by using about system ActiveMovie passwords/keys) keywords, symbols, and other data. Web servers do file:///aux more than 9 character password configuration some SSH installations will this with the URL. Sendmail does this with email DoS nph-test-cgi 65589 tcp dns buffer overflow in ICQ read any file overflow VRFY, denial of give potential attackers the Remote Control sdr headers. When the server analyzes the incoming flood overloads CIFS challenge Microsoft Scripting Runtime webserver causes crash. http://host/carbo. service, possible execute SSH version, Key sizes, data, it may misinterpret some symbols or symbol machine (http://XXX.XXX.XXX.XXX/....... dll?icatcommand code from remote if perl or any other and Encryption method combinations (sometimes called meta-characters or CIFS challenge perl escape-characters). When this happens, the server run as ..(and so on..../)) =..\..\*z command interpreter is used. encrypted with users /winnt/system32/sccrun.dll execute remote code as Execute remote code as will perform unintended tasks. An attacker can feed interactive Website Server directly located in /cgi-bin password hash 135 tcp download any file process (NT/Unix) through Carbon Copy process (NT/Unix) special commands into the server coaxing it to run loc-srv user execute arbitrary remote users can execute SunOS X.25 (http://<yourIP>/.html/............/config.sys) numerous buffer overflows any command commands or alter files & databases. get ../../* commands via args.cmd 139 tcp netbios-ssn accounts registry key set world read any file ICQ packet leaks internal IP addresses read any file on the system 514 UDP packets with writable (HKLM\Software\Seattle X.25 gateways are often PIX on multi-homed machines ( sendmail -oEfilename_to_read ) strange options can IIS Lab\SLMail\Users) Bay Networks Annex targets of attack. X.25 25 tcp sendmail <EXCH-VERIFY>: ExchAuthenticate() called with udp cause reboot PADS should have access PC Anywhere Firewall fpcount.exe NTServerName:[KBJV_SRV1] /usr/lib/fs/ufs/ufsdump dictionary Terminal Server sendmail -d bug gets root controls. NTDomainName[KBJV_PERTH] ( sendmail -d3294967296 ) syslog FIN fragments can crack Seattle Labs buffer overflow adminMailbox:[xxxxxx] DoS by sending incomplete DoS over firewall (http://annex.www.server/ping?query=<buffer>) rpc.ypupdated Allaire Forums Alibaba adminLoginName:[xxxxxx]password:[xxxxxx] sendmail send/vrfy/expn/mail from:/rcpt local user GECOS if DNS record doesn't exist for users allowed httpd GetFile.cfm to: commands buffer overflow in cgi- rtools overflow, get root declared host, syslogd crashes rpc.ypupdated /usr/lib/fs/ufs/ufsrestore to bind to read any file carbo.dll shl/win-c-sample.exe - remote user execute queue files privileged http://host/GetFile.cfm?FT=Text&FST=P inserting newlines into queue files causes execute code from remote commands as root ports lain&FilePath=C:\*.* arbitrary commands to be run groups are not set properly - Cheyenne upload and run any 11 stores cleartext link to a file another owns, get get remote root access execute commands as IP Header iCat Carbo Suite code via uploader.exe password in test.log local user gets root ArcServe EXPN can be used to targets groups root from remote 6050 tcp decode find destination udp 25 tcp addresses of aliases & pipe mail through REHUP attack causes any tcp lists Wizard mode backdoor gives root systat Livingston RADIUS 2080 tcp sendmail allows mail Guest user can change decode alias and create program to be run as root test.log relaying has default accounts: password Sendmail Linux Kernel monitor,monitor DEBUG mode allows remote execution of systat will give away system can sniff radius client/server 1031 tcp inetinfo can force max of 2 session to manager,manager aliases piped to programs ? Ascend Wingate has blank commands as root state information to an interaction and recover shared MIME buffer overflow - get root may allow common attacks stay open, will no longer admin,<blank> password Sendmail attacker, including which secret Screen Saver accept TCP connections rpc.cmsd 1029 security,security relaying allows software is running on the tcp File ../..* Any File Majordomo 'REPLY TO:' backtick Outlook What is a relative anonymous machine overflow reverse name invalid IP options access/execution Guest account has blank password VRFY can be if username is a filename, attack - execute arbitrary (*.scr) spamming lookup field - get root on cause seg fault 1038 tcp Password/session/audio/ used to identify can mail to file 98/Express path? commands execute remote code as root video/keystroke sniffing 3Com Wingate valid user target certain versions of NT run 23 tcp screensaver under (SunOS) Programs which do not fully qualify file 23 tcp telnet accounts mail can be overflow syslog() function and get Email send user#999999 overflow Sendmail relaying allows 253 byte password buffer copied SYSTEM account. Can paths (absolute path) can be tricked can list files forged from any root Header anonymous spamming into 128 byte stack buffer add normal user to admin into running trojan programs. If the invalid fragmentation * tcp Back Orifice from remote address (31337) Mail to program ( Windows group. original executable is running in an causes network stack to Port Redirection bounced mail with a piped FROM Can bounce TCP sessions RCPT TO: | elevated context (such as suid), the fail * tcp ( MAIL FROM: |/bin/sed'1,/^$/d|/bin/sh ) crash server through bogus (12345) read any file on system <program> ) NT SNMP ipop3d trojan may be executed with the same ? link /var/tmp/dead.letter to any accounting messages privileges. Initialization files, shared (http://www.server.com:8010/c:/ - NT/Win9x filename field Netbus file, appends data (get root on libraries such as DLL's, and http://www.server.com:8010// - NT/Win9x Can connect to self causing DoS Third packet during setup contains overflow, execute 8010 tcp wingate ../..* Any File system locally via /etc/passwd) dump all usernames in If coredump, it has encrypted temporary files may all be subject to What is dictionary LogFile service http://www.server.com:8010/..../ - Win9x) cleartext username/password remote code domain passwords, if /core already exists, this type of attack. EHLO command will reveal what Cold Fusion Server cracking? X11R4 Cistron RADIUS permissions are retained 21 tcp extended SMTP commands are ftp SITE EXEC command allows send XXXXXX issue many PASV in AMaVIS accepted by the server. delete all WINS records A cryptographic hash can be obtained and cracked via PASV DoS - commands to executed from remote buffer overflow succession and use replace trusted relative brute force. Although it cannot be "decrypted", a consume all (~4000 chars) upload any file 20 tcp ftp-data IIS FTPd anonymous up all ports scanmails script path with Trojan, exec program can encrypt every word in the dictionary connections user can suid, get root against the hash, and if they match, the password has script will expand the subject heading of default 'public' write c:\winnt\* rename files insmod been found.