1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-05 22:19:03 +00:00

Update some documenation in smb-check-vulns.nse.

This commit is contained in:
david
2008-11-10 23:18:20 +00:00
parent c38aa90312
commit 9d97468d48

View File

@@ -1,27 +1,31 @@
id = "MSRPC: Check vulns()"
id = "MSRPC: Check vulnerabilities"
description = [[
Currently, this script checks if a host is vulnerable to ms08-067. I'd like to add
checks for more vulnerabilities, but I'm worried about licensing/copyright issues
(since I'd be basing them on non-free tools).
Checks if a host is vulnerable to MS08-067, a Windows RPC vulnerability that
can allow remote code execution. This script is intended to check for more
vulnerabilities in the future.
Checking for the ms08-067 vulnerability is very dangerous, as the check is likely
Checking for MS08-067 is very dangerous, as the check is likely
to crash systems. On a fairly wide scan conducted by Brandon Enright, we determined
that a vulnerable on average, is about 50% more likely to crash than to survive
that on average, a vulnerable system is more likely to crash than to survive
the check. Out of 82 vulnerable systems, 52 crashed. As such, great care should be
taken when using this check.
You have the option to supply a username/password when performing this check, but
You have the option to supply a username and password, but
it shouldn't be necessary for a default configuration.
]]
-- Currently, this script checks if a host is vulnerable to ms08-067. I'd like to add
-- checks for more vulnerabilities, but I'm worried about licensing/copyright issues
-- (since I'd be basing them on non-free tools).
---
--@usage
-- nmap --script smb-checkvulns.nse -p445 <host>
-- sudo nmap -sU -sS --script smb-checkvulns.nse -p U:137,T:139 <host>
-- nmap --script smb-check-vulns.nse -p445 <host>
-- sudo nmap -sU -sS --script smb-check-vulns.nse -p U:137,T:139 <host>
--
--@output
-- Host script results:
-- |_ smb-checkvulns: This host is vulnerable to ms08-067
-- |_ smb-check-vulns: This host is vulnerable to MS08-067
--
-- @args smb* This script supports the <code>smbusername</code>,
-- <code>smbpassword</code>, <code>smbhash</code>, <code>smbguest</code>, and
@@ -53,7 +57,7 @@ local VULNERABLE = 1
local PATCHED = 2
local UNKNOWN = 3
---Check if the server is patched for ms08-067. This is done by calling NetPathCompare() with an
---Check if the server is patched for MS08-067. This is done by calling NetPathCompare with an
-- illegal string. If the string is accepted, then the server is vulnerable; if it's rejected, then
-- you're safe (for now).
--
@@ -123,12 +127,12 @@ action = function(host)
end
if(result == VULNERABLE) then
response = "This host is vulnerable to ms08-067"
response = "This host is vulnerable to MS08-067"
elseif(result == UNKNOWN) then
response = "This host is likely vulnerable to ms08-067 (it stopped responding during the test)"
response = "This host is likely vulnerable to MS08-067 (it stopped responding during the test)"
else
if(nmap.verbosity() > 0) then
response = "This host is patched for ms08-067"
response = "This host is patched for MS08-067"
else
response = nil
end