Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/windows/smb/smb_rras_erraticgopher.md
Views: 11789
Vulnerable Application
This module exploits an overflow in the Windows Routing and Remote Access Service (RRAS) to execute code as SYSTEM.
The RRAS DCERPC endpoint is accessible to unauthenticated users via SMBv1 browser named pipe on Windows Server 2003 and Windows XP hosts; however, this module targets Windows Server 2003 only.
Since the service is hosted inside svchost.exe
, a failed exploit attempt can cause other system services to fail as well.
The module has been successfully tested on:
Windows Server 2003 SP0 (x86)
Windows Server 2003 SP1 (x86)
Windows Server 2003 SP2 (x86)
Windows Server 2003 R2 SP2 (x86)
Verification Steps
Windows:
Launch
services.msc
Start
Routing and Remote Access Service
Note that the service may take up to one minute to start.
Metasploit:
Start msfconsole
Do:
use exploit/windows/smb/smb_rras_erraticgopher
Do:
set rhosts <rhosts>
Do:
run
You should get a
SYSTEM
shell.
Options
SMBPIPE
The pipe name to use (default: browser
)
Scenarios
Windows Server 2003 R2 SP2 (x86)
Mitigation
Microsoft have released KB4024323 for Windows 2003 and Windows XP: