解决办法:
针对以上漏洞,建议用户对您的机器采取以下措施:
1、下载安装相应的补丁程序:
针对第一个漏洞微软已经发布了相应的安全公告与补丁程序,你可以到我们的网站下载:
winnt
win2000
winxp
win2003
针对其他两个漏洞,微软目前还没有发布相应的补丁程序,我们建议您使用window自动update
功能,随时关注厂商的动态,你也可以参考http://www.ccert.edu.cn
我们会在第一时间提供相应的补丁程序下载2、使用防火墙关闭所有不必要的端口,根据我们现在掌握的信息,这些漏洞不仅仅影响135端口,
它影响到大部分调用DCOM函数的服务端口,因此CCERT建议用户使用网络或是个人防火墙过滤以
下端口:
135/TCP epmap
135/UDP epmap
139/TCP netbios-ssn
139/UDP netbios-ssn
445/TCP microsoft-ds
445/UDP microsoft-ds
593/TCP http-rpc-epmap
593/UDP http-rpc-epmap
3、使用IDS系统检测来自于网络上的攻击,IDS规则如下:
alert tcp $EXTERNAL_NET any -> $HOME_NET 445
(msg:"NETBIOS SMB DCERPC ISystemActivator bind attempt"; flow:to_server,established;
content:"|FF|SMB|25|"; nocase; offset:4; depth:5; content:"|26 00|"; distance:56;
within:2; content:"|5c 00|P|00|I|00|P|00|E|00 5c 00|"; nocase; distance:5; within:12;
content:"|05|"; distance:0; within:1; content:"|0b|"; distance:1; within:1;
byte_test:1,&,1,0,relative; content:"|A0 01 00 00 00 00 00 00 C0 00 00 00 00 00 00 46|";
distance:29; within:16; reference:cve,CAN-2003-0352;classtype:
attempted-admin; sid:2193; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET 135
(msg:"NETBIOS DCERPC ISystemActivator bind attempt"; flow:to_server,established;
content:"|05|"; distance:0; within:1; content:"|0b|"; distance:1; within:1; byte_test:
1,&,1,0,relative; content:"|A0 01 00 00 00 00 00 00 C0 00 00 00 00 00 00 46|";
distance:29; within:16; reference:cve,CAN-2003-0352; classtype:attempted-admin;
sid:2192; rev:1;)
|