Merge remote-tracking branch 'origin/pr/2' into ms08_067_check

bug/bundler_fix
sho-luv 2014-01-08 19:17:10 -05:00
commit a2958d467c
1 changed files with 8 additions and 3 deletions

View File

@ -14,8 +14,8 @@ class Metasploit3 < Msf::Auxiliary
def initialize def initialize
super( super(
'Name' => 'Scanner for MS08-067', 'Name' => 'MS08-067 Scanner',
'Description' => 'This module simply uses the check in the ms08_067_netapi.rc to scan a network for it', 'Description' => 'This module uses the check in ms08_067_netapi to scan a network for the vulnerability.',
'References' => 'References' =>
[ [
[ 'CVE', '2008-4250'], [ 'CVE', '2008-4250'],
@ -35,7 +35,6 @@ class Metasploit3 < Msf::Auxiliary
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'DefaultOptions' => {} 'DefaultOptions' => {}
) )
#deregister_options('MAILFROM', 'MAILTO')
register_options( register_options(
[ [
OptString.new('SMBPIPE', [ true, "The pipe name to use (BROWSER, SRVSVC)", 'BROWSER']), OptString.new('SMBPIPE', [ true, "The pipe name to use (BROWSER, SRVSVC)", 'BROWSER']),
@ -45,6 +44,12 @@ class Metasploit3 < Msf::Auxiliary
def run_host(ip) def run_host(ip)
if check_vuln == Msf::Exploit::CheckCode::Vulnerable if check_vuln == Msf::Exploit::CheckCode::Vulnerable
print_good("#{ip}:#{rport} - MS08-067 VULNERABLE") print_good("#{ip}:#{rport} - MS08-067 VULNERABLE")
report_vuln({
:host => ip,
:name => "MS08-067",
:info => "Vulnerability in Server service could allow remote code execution",
:refs => self.references
})
end end
end end