Either the offset or the env page moves around for this exploit on some non-english systems, do not default the target for 2003 SP0
git-svn-id: file:///home/svn/framework3/trunk@13206 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
2ea46552ad
commit
8887fe86b8
|
@ -12,7 +12,7 @@
|
|||
require 'msf/core'
|
||||
|
||||
class Metasploit3 < Msf::Exploit::Remote
|
||||
Rank = GreatRanking
|
||||
Rank = GoodRanking
|
||||
|
||||
include Msf::Exploit::Remote::DCERPC
|
||||
include Msf::Exploit::Remote::SMB
|
||||
|
@ -133,8 +133,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
mytarget = targets[2]
|
||||
|
||||
when /Windows Server 2003 (\d+)$/
|
||||
print_status("Detected a Windows 2003 SP0 target")
|
||||
mytarget = targets[5]
|
||||
print_status("Detected a Windows 2003 SP0 target, but have not confirmed English language")
|
||||
print_status("To exploit this system, \"set TARGET 5\" and run this exploit again")
|
||||
# mytarget = targets[5]
|
||||
return
|
||||
|
||||
when /Windows Server 2003 (\d+) Service Pack (\d+)/
|
||||
print_status("Windows 2003 SP#{$2} is not exploitable")
|
||||
|
@ -326,3 +328,4 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue