POC详情: 6053a0e345cfbaf38cd19c7cf4611277535bde17

来源
关联漏洞
标题: Microsoft Lightweight Directory Access Protocol 缓冲区错误漏洞 (CVE-2024-49113)
描述:Microsoft Lightweight Directory Access Protocol(LDAP)是美国微软(Microsoft)公司的一种目录服务协议,在 TCP/IP 堆栈之上的层上运行。 Microsoft Lightweight Directory Access Protocol存在缓冲区错误漏洞。攻击者利用该漏洞导致系统拒绝服务。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 f
介绍
# CVE-2024-49113-Checker
Script to test whether your environment is potentially vulnerable to CVE-2024-49113 (LDAP Nightmare). This script performs:
   -  RPC connectivity checks
   -  LDAP port tests
   -  Netlogon service validation
   -  LDAP callback verification


![picha](https://github.com/user-attachments/assets/a93c1675-c0a5-4898-918c-80160f0ee99f)   

```
usage : python CVE-2024-49113-checker.py <target>
```
    

```
Example
 # Scan a single IP
python CVE-2024-49113-checker.py 192.168.1.1

# Scan a subnet
python CVE-2024-49113-checker.py 192.168.1.0/24

# Scan from a file
python CVE-2024-49113-checker.py ips.txt -o vulnerable_hosts.txt
```
  ### Note: This tool does NOT exploit the vulnerability; it only checks for conditions that may make exploitation possible.
文件快照

[4.0K] /data/pocs/6053a0e345cfbaf38cd19c7cf4611277535bde17 ├── [4.5K] CVE-2024-49113-checker.py └── [ 784] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。