| 
                         >受影响的版本:
   Windows Server 2003 (Internet Explorer 6.0)
   漏洞观察:
   Windows Server 2003的这个漏洞会致使远程攻击者篡改注册表"Shell Folders"目录,从而无需任何登陆认证,轻易获得系统文件夹中%USERPROFILE%文件的访问权。
   ex.) %USERPROFILE% = "C:Documents and Settings%USERNAME%" 
   详细资料:
   远程攻击者篡改Windows Server 2003系统注册表中的"Shell Folders"目录,通过"shell:[Shell Folders].." 将本地文件与恶意程序链接。
   [Shell Folders]
   HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folders 
   AppData: "C:Documents and Settings%USERNAME%Application Data" 
   Cookies: "C:Documents and Settings%USERNAME%Cookies" 
   Desktop: "C:Documents and Settings%USERNAME%Desktop" 
   Favorites: "C:Documents and Settings%USERNAME%Favorites" 
   NetHood: "C:Documents and Settings%USERNAME%NetHood" 
   Personal: "C:Documents and Settings%USERNAME%My Documents" 
   PrintHood: "C:Documents and Settings%USERNAME%PrintHood" 
   Recent: "C:Documents and Settings%USERNAME%Recent" 
   SendTo: "C:Documents and Settings%USERNAME%SendTo" 
   Start Menu: "C:Documents and Settings%USERNAME%Start Menu" 
   Templates: "C:Documents and Settings%USERNAME%Templates" 
   Programs: "C:Documents and Settings%USERNAME%Start MenuPrograms" 
   Startup: "C:Documents and Settings%USERNAME%Start MenuProgramsStartup" 
   Local Settings: "C:Documents and Settings%USERNAME%Local Settings" 
   Local AppData: "C:Documents and Settings%USERNAME%Local SettingsApplication Data" 
   Cache: "C:Documents and Settings%USERNAME%Local SettingsTemporary Internet Files" 
   History: "C:Documents and Settings%USERNAME%Local SettingsHistory" 
   My Pictures: "C:Documents and Settings%USERNAME%My DocumentsMy Pictures" 
   Fonts: "C:WINDOWSFonts" 
   My Music: "C:Documents and Settings%USERNAME%My DocumentsMy Music" 
   My Video: "C:Documents and Settings%USERNAME%My DocumentsMy Videos" 
   CD Burning: "C:Documents and Settings%USERNAME%Local SettingsApplication 
   DataMicrosoftCD Burning" 
   Administrative Tools: "C:Documents and Settings%USERNAME%Start 
   MenuProgramsAdministrative Tools"
   恶意代码示例:
   ************************************************** 
   This exploit reads %TEMP%exploit.html. 
   You need to create it. 
   And click on the malicious link. 
   ************************************************** 
   Malicious link: 
   Exploit
   微软举措:
   微软已于2003年6月9日发布了此漏洞公告,计划于下一个版本的windows补丁中添加此漏洞的修补程序。
  文章来源:金山毒霸编译                         (编辑:泰州站长网) 
【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容! 
                     |