
Metasploit mailing list archives
Samba NTTRANS
From: Craig Freyman <craigfreyman () gmail com>
Date: Fri, 8 Oct 2010 15:01:42 -0600
I'm unable to set any payloads for the samba nttrans exploit: msf exploit(nttrans) > info Name: Samba 2.2.2 - 2.2.6 nttrans Buffer Overflow Version: 9167 Platform: Privileged: Yes License: Metasploit Framework License (BSD) Rank: Average Provided by: hdm <hdm () metasploit com> Available targets: Id Name -- ---- 0 Samba 2.2.x Linux x86 Basic options: Name Current Setting Required Description ---- --------------- -------- ----------- RHOST xxxx yes The target address RPORT 139 yes The target port Payload information: Space: 1024 Avoid: 1 characters Description: This module attempts to exploit a buffer overflow vulnerability present in versions 2.2.2 through 2.2.6 of Samba. The Samba developers report this as: "Bug in the length checking for encrypted password change requests from clients." The bug was discovered and reported by the Debian Samba Maintainers. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=2003-0085 http://www.osvdb.org/6323 http://www.securityfocus.com/bid/7106 http://www.samba.org/samba/history/samba-2.2.7a.html msf exploit(nttrans) > show payloads msf exploit(nttrans) > Any ideas?
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Samba NTTRANS Craig Freyman (Oct 08)
- Re: Samba NTTRANS Joshua J. Drake (Oct 08)