漏洞信息详情
Netware IPX管理会话伪骗漏洞
漏洞简介
Novell 5及之前版本,在运行于包签名小于3级的IPX时存在漏洞。远程攻击者通过伪造IPC碎片数据包中的MAC地址获得管理特权,其中的IPC碎片数据包会引起NetWare Core Protocol (NCP)的调用。
漏洞公告
Quoted verbatim from the NMRC advisory: Use Packet Signature Level 3 everywhere, and make sure clients cannot touch their own signature settings. LAN Admins should never access a server unless using Level 3, and the security on the workstation should be restrictive enough to prevent unauthorized adjustments (i.e. use a locked-down NT client with no server services running, behind a locked door, although this simply places your trust in Microsoft). Use switched Ethernet.
参考网址
来源: BID 名称: 528 链接:http://www.securityfocus.com/bid/528 来源: BUGTRAQ 名称: 19990715 NMRC Advisory: Netware 5 Client Hijacking 链接:http://marc.theaimsgroup.com/?l=bugtraq&m=93214475111651&w=2
受影响实体
- Novell Netware:4.1<!--2000-1-1-->
- Novell Netware:4.11:Sp5b<!--2000-1-1-->
- Novell Netware:5.0<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...