MS09-001漏洞基本分析

微软发布了2009年的首个安全补丁,修复了SRV.SYS驱动中的三个漏洞,这些漏洞可能导致远程用户通过发送畸形WriteAndX请求使Windows系统崩溃。其中CVE-2008-4114是由于内存拷贝导致的源指针计算错误,而非溢出。另外两个漏洞(CVE-2008-4834和CVE-2008-4835)涉及小缓冲区清理,可能引发NULL字节覆盖,虽可能导致DoS攻击,但尚未证实能执行代码。
摘要由CSDN通过智能技术生成

This Black Tuesday (the 13th, no less), Microsoft released the first security patch of 2009. This patch addresses three vulnerabilities in the SRV.SYS driver of the Microsoft Windows operating system. The SRV.SYS driver implements the Server Service component of the SMB network service, exposed via ports 139 and 445. The first issue addressed in this patch (CVE-2008-4114) has been public since September 14th, 2008 and allows a remote user to crash a Windows-based system by sending a malformed WriteAndX request to a named pipe. This flaw is interesting because it is triggered by memory copy, but instead of an overflow, it is a miscalculation of the source pointer. When the target machine receives this write request, it attempts to read from a memory location that may not exist, causing the entire operating system to crash (and by default, reboot). Nor

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值