Affected Versions:
Microsoft Windows Vista SP2Microsoft Windows Vista SP1Microsoft Windows Server 2008 SP2Microsoft Windows Server 2008Vulnerability description:
Microsoft Windows is a very popular operating system released by Microsoft. The Windows Kernel does not properly initialize objects when handling certain errors, which may cause double release.
Local users can gain kernel-level permission improvement by running malicious applications.
Attackers can exploit this vulnerability to execute
Affected Versions:Microsoft IIS 7.5Microsoft IIS 7.0Microsoft IIS 6.0Microsoft IIS 5.1 vulnerability description:Bugtraq id: 43140Cve id: CVE-2010-1899
Microsoft Internet Information Service (IIS) is a network information server that comes with Microsoft Windows, which includes the HTTP service function.
The script processing code in IIS has the stack overflow vulnerability when processing repeated parameter requests. Remote attackers can exploit this vulnerability by sending a special URI req
1. Vulnerability Definition
Windows supports shortcuts or LNK files. The LNK file is a reference to a local file. clicking the LNK file has the same effect as clicking the target specified by the shortcut.
Windows does not properly process the LNK file. The specially crafted LNK file may cause Windows to automatically execute the code specified by the shortcut file. The code may be in a USB drive, local or remote file system, optical drive, or other location. Using resource manager to view the
the Local System account (or Administrator or another privileged account. The Set Value permission is enabled for the Users Group. Therefore, any authenticated user can Set any Value. Cesar Cerrudo (cesarc56@yahoo.com)
Link: http://secunia.com/advisories/40817/Http://www.argeniss.com/research/ARGENISS-ADV-081002.txtHttp://www.microsoft.com/technet/security/bulletin/MS10-059.mspx? Pf = trueHttp://www.us-cert.gov/cas/techalerts/TA10-222A.html*>Test met
Affected Versions:Microsoft IIS 5.1 vulnerability description:
Microsoft Internet Information Service (IIS) is a network information server that comes with Microsoft Windows, which includes the HTTP service function.
IIS does not properly process the basic directory authentication. Remote attackers can append the NTFS stream name and stream type (: $ i30: $ INDEX_ALLOCATION) to the requested directory name) attackers can bypass authentication to access protected directories.Http://secunia.com/
Affected Versions:Microsoft Excel 2007 SP2Microsoft Excel 2007 SP1Microsoft Office 2004 for Mac vulnerability description:
Excel is a workbook tool in Microsoft office suites.
An uninitialized memory vulnerability exists in Excel parsing the FnGroupName, BuiltInFnGroupCount, and fnkg12 malformed records in the XSL file. attackers who successfully exploit this vulnerability can completely control the affected system. Http://secunia.com/advisories/38805/Http://www.us-cert.gov/cas/techalerts/TA10
Excellent Microsoft Print Spooler Service Impersonation Vulnerability MSF > use exploit/windows/smb/ms10_ 061_SPOOLSS MSF exploit (MS10_061_SPOOLSS) > Info name:microsoft Print Spooler Service Impersonation Vulnerability Modu LE:EXPLOIT/WINDOWS/SMB/MS10_061_SPOOLSS version:14976 platform:windows privileged:yes license:metasploit Framework L Icense (BSD) Rank:excellent provided By:jduckJduck@metasploit. com>HDMHDM@metasploit. com> Available targets:id Name------0 Windows Universal Basic options
exploits that could leads to privilege Esca Lation. The only requirement are the requires the system information from the target.Windows Exploit SuggesterPowerShellThere is also a PowerShell script which target to identify patches that can leads to privilege escalation. This script is called Sherlock and it would check a system for the following:
Ms10-015:user Mode to Ring (kitrap0d)
Ms10-092:
can.1.persistence Rear Penetration ModuleLong-term control of target host by installing self-booting on target host2.METSVC Rear Penetration ModuleInstall Meterpreter as a system service on the target host3.getgui Rear Penetration ModuleTurn on Remote Desktop4. Privilege elevation1.getsystemIntegration of four lifting technologies. -H to view2. Exploiting ms10-073 and ms10-092 vulnerabilities3.service_pers
variables through \ n characters (new lines) in the CGI request, so as to further execute arbitrary code.
In addition, IIS has made several major vulnerabilities in its history. The Green League Research Institute of Science and Technology specially sorted out the information to facilitate IT personnel of enterprises and organizations to learn from IT. Please pay special attention to the following:
Microsoft IISFastCGI Request Header Remote Overflow Vulnerability (
-2012-2333)
OpenSSL CRL Bypass and ECDH denial of service vulnerability
OpenSSL CMS fabric handles Memory Corruption Vulnerability (CVE-2010-0742)
OpenSSL CMS/PKCS #7 decryption for security vulnerabilities
OpenSSL "Asn1_d2i_read_bio ()" Der Format Data Processing Vulnerability
OpenSSH ' ssh_gssapi_parse_ename () ' Function denial of service vulnerability
Nginx DNS resolver remote heap buffer Overflow Vulnerabili
Important
Denial of Service
No need to restart
Microsoft Lync Server
Before the patch is released, we do not rule out the possibility of changing the above information.
Advance notice webpage:Detailed security bulletins summary can be found on this page details: https://technet.microsoft.com/zh-cn/library/security/ms14-sep (English)
Microsoft WindowsMalware deletion tool:Microsoft will release an updated version of the Microsoft Windows malware deletion tool on Wind
Today brings you a basic tutorial on Metasploit, the tool used is Kali Linux (command line mode)About the development process of Metasploit everyone Baidu I will not repeat theFirst Open the MsfconsoleWe can see many of the attack modules integrated in the MetasploitWith the show command we can view these modulesBelow we use Windows's famous vulnerability ms10-018 (browser exploit vulnerability, applicable to EXPLORER6, 7) for an intranet infiltration
following vendors:Microsoft IIS 5.1Microsoft Security Update for Windows XP (KB2290570)Http://www.microsoft.com/downloads/en/details.aspx? Familyid = AE55787E-4 A5C-48D5-AEDF-0ABADA514938 displaylang = enVulnerability message LinkHttp://soroush.secproject.com/downloadable/IIS5.1_Authentication_Bypass.pdfHttp://soroush.secproject.com/blog/2010/07/iis5-1-directory-authentication-bypass-by-using-i30index_allocation/Http://www.microsoft.com/technet/security/Bulletin/
12 MS 8 ms10 p4-0.sanjose1-nbr2.bbnplanet.net (4.0.5.97) 70 MS 70 MS 70 ms11 p1-0.sanjose1-nbr1.bbnplanet.net (4.0.5.85) 70 MS 70 MS 70 ms12 p4-0.paloalto-nbr2.bbnplanet.net (4.0.1.1) 70 MS 74 MS 70 ms13 p0-0-0.paloalto-cr18.bbnplane T.net (4.0.3.86) 70 MS 74 MS 74 ms14 h1-0.atteasylink.bbnplanet.net (4.1.142.254) 74 MS 74 MS 78 ms15 199.37.127.234 (199.37.127.234) 78 MS 74 MS 78 ms16 205.174.74.170 (small) 230 MS 238 MS 227 ms17 202.97.9.65 (202.97.
Privilege Escalation for Ms08-023 local vulnerabilities
Add a user 456View this user
Log on with this user
Permission escalation failedPrivilege Escalation
Elevation of permission successful
MS10-048
Be careful when using this vulnerabilityDirectly execute this vulnerability without parameters to automatically shut down your Virtual Machine (winxp) and shut down automatically when it is started. After reading the code in detail, I still cann
6 10.0.4.6 (10.0.4.6) 15.949 ms 5.061 ms 4.393 MS 7 120.236.177.1 (120.236.177.1) 5.012 ms 5.007 ms 4.999 ms 8 120.196.2.9 (120.196.2.9) 9.313 ms 9.304 MS 120.196.2.97 (120.196.2.97) 9.290 Ms 9 120.196.240.41 (120.196.240.41) 4.962 Ms 120.196.240.93 (120.196.240.93) 9.233 Ms 120.196.2 40.41 (120.196.240.41) 6.145 ms10 221.183.26.53 (221.183.26.53) 9.873 Ms 221.183.26.125 (221.183.26.125) 9.212 MS 9.2 MS11 221.176.22.182 (221.176.22.182) 9.857 Ms 221
Formsauthentication.decrypt error Length of the data to Decrypt is invalid.For login between different servers in the same domain, encrypt the configuration instructions:Https://msdn.microsoft.com/zh-cn/library/w8h3skw9.aspxWorkaround 1:Http://www.knowsky.com/606889.htmlWorkaround 2:Update Security PatchesHttp://stackoverflow.com/questions/7728658/asp-net-formsauthentication-length-of-the-data-to-decrypt-is-invalidHttp://weblogs.asp.net/scottgu/important-asp-net-security-vulnerabilityPatch Listh
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.