CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

漏洞编号:SMB / NETBIOS Null Session Accessible

2017年6月6日 1693点热度 0人点赞 0条评论

漏洞类别:SMB / NETBIOS

漏洞等级:

漏洞信息

A Null session is an anonymous connection to an inter-process communication network service on Windows-based computers.
The service is designed to allow named pipe connections but may be used by attackers to remotely gather information about the system.

The target can be connected by a Null session (no username and no password).

QID detection logic (unauthenticated):
The target can be connected by a Null session (no username and no password). This QID does not test for registry key or file access on the target.

漏洞危害

An attacker can call APIs and use Remote Procedure calls to enumerate information. Null session access can be used for escalating privileges and perform DoS attacks.

解决方案

- Block NetBIOS on your Windows server by preventing these TCP ports 139, and 445 from passing through your network firewall or host based firewall.
- Disable File and Printer Sharing
- Restrict anonymous connections to the system

0daybank

标签: 暂无
最后更新:2017年6月6日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me