[prev in list] [next in list] [prev in thread] [next in thread] 

List:       metasploit-framework
Subject:    Re: [framework] EOFerror on IIS 5.0 - SSL Remote Buffer Overflow	Exploit
From:       "HD Moore" <x () hdm ! io>
Date:       2014-12-14 19:49:33
Message-ID: 009f01d017d7$16729580$4357c080$ () hdm ! io
[Download RAW message or body]

This is a multipart message in MIME format.

[Attachment #2 (multipart/alternative)]
This is a multipart message in MIME format.


This looks like expected behavior if the target has already been exploited or it has \
been patched. The EOF exception is just the server closing the socket before the \
exploit completes.

 

-HD

 

From: framework [mailto:framework-bounces@spool.metasploit.com] On Behalf Of Yang Yu
Sent: Sunday, December 14, 2014 12:43 AM
To: framework
Subject: Re: [framework] EOFerror on IIS 5.0 - SSL Remote Buffer Overflow Exploit

 

Hello,

After changing LogLevel to 3, I got the stack trace:

/opt/metasploit/apps/pro/msf3/msfconsole:48:in `<main>'
[12/14/2014 17:51:46] [d(1)] core: Module x86/shikata_ga_nai is compatible with \
windows/ssl/ms04_011_pct [12/14/2014 17:51:46] [i(0)] core: \
windows/meterpreter/reverse_tcp: iteration 1: Successfully encoded with encoder \
x86/shikata_ga_nai (size is 320) [12/14/2014 17:51:47] [e(0)] core: Exploit failed \
(windows/ssl/ms04_011_pct): EOFError EOFError [12/14/2014 17:51:47] [d(3)] core: Call \
                stack:
/usr/share/metasploit-framework/lib/rex/io/stream.rb:203:in `get_once'
/usr/share/metasploit-framework/modules/exploits/windows/ssl/ms04_011_pct.rb:151:in \
                `exploit'
/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:205:in `job_run_proc'
/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:166:in `run'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:136:in \
                `exploit_simple'
/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:161:in \
                `exploit_simple'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:111:in \
                `cmd_exploit'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:427:in \
                `run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:389:in `block in \
                run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:383:in `each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:383:in \
                `run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:200:in `run'
/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:30:in \
                `start'
/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in \
                `start'
/opt/metasploit/apps/pro/msf3/msfconsole:48:in `<main>'

Any ideas what's wrong? Thanks.

 

 

On Sat, Dec 13, 2014 at 10:28 PM, Tod Beardsley <todb@packetfu.com \
<mailto:todb@packetfu.com> > wrote:

If you first `setg LogLevel 3` your framework.log will have the complete stack trace.


[Attachment #5 (text/html)]

<html xmlns:v="urn:schemas-microsoft-com:vml" \
xmlns:o="urn:schemas-microsoft-com:office:office" \
xmlns:w="urn:schemas-microsoft-com:office:word" \
xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" \
xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type \
content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 \
(filtered medium)"><style><!-- /* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div \
class=WordSection1><p class=MsoNormal><span \
style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'>This looks \
like expected behavior if the target has already been exploited or it has been \
patched. The EOF exception is just the server closing the socket before the exploit \
completes.<o:p></o:p></span></p><p class=MsoNormal><span \
style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p>&nbsp;</o:p></span></p><p \
class=MsoNormal><span \
style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'>-HD<o:p></o:p></span></p><p \
class=MsoNormal><span \
style='font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D'><o:p>&nbsp;</o:p></span></p><div \
style='border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div \
style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p \
class=MsoNormal><b><span \
style='font-size:11.0pt;font-family:"Calibri",sans-serif'>From:</span></b><span \
style='font-size:11.0pt;font-family:"Calibri",sans-serif'> framework \
[mailto:framework-bounces@spool.metasploit.com] <b>On Behalf Of </b>Yang \
Yu<br><b>Sent:</b> Sunday, December 14, 2014 12:43 AM<br><b>To:</b> \
framework<br><b>Subject:</b> Re: [framework] EOFerror on IIS 5.0 - SSL Remote Buffer \
Overflow Exploit<o:p></o:p></span></p></div></div><p \
class=MsoNormal><o:p>&nbsp;</o:p></p><div><div><div><p class=MsoNormal \
style='margin-bottom:12.0pt'>Hello,<o:p></o:p></p></div><p class=MsoNormal \
style='margin-bottom:12.0pt'>After changing LogLevel to 3, I got the stack \
trace:<br><br>/opt/metasploit/apps/pro/msf3/msfconsole:48:in \
`&lt;main&gt;'<br>[12/14/2014 17:51:46] [d(1)] core: Module x86/shikata_ga_nai is \
compatible with windows/ssl/ms04_011_pct<br>[12/14/2014 17:51:46] [i(0)] core: \
windows/meterpreter/reverse_tcp: iteration 1: Successfully encoded with encoder \
x86/shikata_ga_nai (size is 320)<br>[12/14/2014 17:51:47] [e(0)] core: Exploit failed \
(windows/ssl/ms04_011_pct): EOFError EOFError<br>[12/14/2014 17:51:47] [d(3)] core: \
Call stack:<br>/usr/share/metasploit-framework/lib/rex/io/stream.rb:203:in \
`get_once'<br>/usr/share/metasploit-framework/modules/exploits/windows/ssl/ms04_011_pct.rb:151:in \
`exploit'<br>/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:205:in \
`job_run_proc'<br>/usr/share/metasploit-framework/lib/msf/core/exploit_driver.rb:166:in \
`run'<br>/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:136:in \
`exploit_simple'<br>/usr/share/metasploit-framework/lib/msf/base/simple/exploit.rb:161:in \
`exploit_simple'<br>/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/exploit.rb:111:in \
`cmd_exploit'<br>/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:427:in \
`run_command'<br>/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:389:in \
`block in run_single'<br>/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:383:in \
`each'<br>/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:383:in \
`run_single'<br>/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:200:in \
`run'<br>/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:30:in \
`start'<br>/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in \
`start'<br>/opt/metasploit/apps/pro/msf3/msfconsole:48:in \
`&lt;main&gt;'<o:p></o:p></p></div><p class=MsoNormal>Any ideas what's wrong? \
Thanks.<o:p></o:p></p><div><p class=MsoNormal \
style='margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p></div></div><div><p \
class=MsoNormal><o:p>&nbsp;</o:p></p><div><p class=MsoNormal>On Sat, Dec 13, 2014 at \
10:28 PM, Tod Beardsley &lt;<a href="mailto:todb@packetfu.com" \
target="_blank">todb@packetfu.com</a>&gt; wrote:<o:p></o:p></p><blockquote \
style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in \
6.0pt;margin-left:4.8pt;margin-right:0in'><p class=MsoNormal>If you first `setg \
LogLevel 3` your framework.log will have the complete stack \
trace.<o:p></o:p></p></blockquote></div></div></div></div></body></html>


[Attachment #6 (text/plain)]

_______________________________________________
https://dev.metasploit.com/mailman/listinfo/framework


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic