From 1a4f3f7d6c83281baaac7a21ae515e00f2ceef85 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Fri, 5 Mar 2021 04:08:41 -0600 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 74 +++++++++++++++++++++++++++++++++++ 1 file changed, 74 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 6499cce925..7874deb913 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -149789,6 +149789,80 @@ }, "needs_cleanup": null }, + "exploit_windows/smb/smb_rras_erraticgopher": { + "name": "Microsoft Windows RRAS Service MIBEntryGet Overflow", + "fullname": "exploit/windows/smb/smb_rras_erraticgopher", + "aliases": [ + + ], + "rank": 200, + "disclosure_date": "2017-06-13", + "type": "exploit", + "author": [ + "Equation Group", + "Shadow Brokers", + "VĂ­ctor Portal", + "bcoles " + ], + "description": "This module exploits an overflow in the Windows Routing and Remote\n Access Service (RRAS) to execute code as SYSTEM.\n\n The RRAS DCERPC endpoint is accessible to unauthenticated users via\n SMBv1 browser named pipe on Windows Server 2003 and Windows XP hosts;\n however, this module targets Windows Server 2003 only.\n\n Since the service is hosted inside svchost.exe, a failed exploit\n attempt can cause other system services to fail as well.\n\n The module has been successfully tested on:\n\n Windows Server 2003 SP0 (x86);\n Windows Server 2003 SP1 (x86);\n Windows Server 2003 SP2 (x86); and\n Windows Server 2003 R2 SP2 (x86).", + "references": [ + "CVE-2017-8461", + "CWE-119", + "BID-99012", + "EDB-41929", + "PACKETSTORM-147593", + "URL-https://www.securitytracker.com/id/1038701", + "URL-https://github.com/x0rz/EQGRP_Lost_in_Translation/blob/master/windows/exploits/Erraticgopher-1.0.1.0.xml", + "URL-https://support.microsoft.com/en-us/topic/microsoft-security-advisory-4025685-guidance-for-older-platforms-june-13-2017-05151e8a-bd7f-f769-43df-38d2c24f96cd", + "URL-https://docs.microsoft.com/en-us/previous-versions/windows/desktop/legacy/aa374540(v=vs.85)", + "URL-https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrasm/ebc5c709-36d8-4520-a0ac-6f36d2d6c0b2", + "URL-https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrasm/5dca234b-bea4-4e67-958e-5459a32a7b71", + "URL-https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrasm/4305d67f-9273-49fe-a067-909b6ae8a341", + "URL-https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrasm/3ca0723e-36ea-448a-a97e-1906dd3d07a6", + "URL-https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrasm/dda988f0-4cce-4ffe-b8c9-d5199deafba5", + "URL-https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrasm/169e435d-a975-4c1c-bf41-55fd2bd76125" + ], + "platform": "Windows", + "arch": "x86", + "rport": 445, + "autofilter_ports": [ + 139, + 445 + ], + "autofilter_services": [ + "netbios-ssn", + "microsoft-ds" + ], + "targets": [ + "Automatic", + "Windows Server 2003 SP0 (English)", + "Windows Server 2003 SP1 (English) (NX)", + "Windows Server 2003 SP2 (English) (NX)", + "Windows Server 2003 R2 SP2 (English) (NX)" + ], + "mod_time": "2021-03-03 02:50:42 +0000", + "path": "/modules/exploits/windows/smb/smb_rras_erraticgopher.rb", + "is_install_path": true, + "ref_name": "windows/smb/smb_rras_erraticgopher", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "AKA": [ + "ErraticGopher" + ], + "Stability": [ + "crash-service-down" + ], + "SideEffects": [ + "ioc-in-logs" + ], + "Reliability": [ + "unreliable-session" + ] + }, + "needs_cleanup": null + }, "exploit_windows/smb/timbuktu_plughntcommand_bof": { "name": "Timbuktu PlughNTCommand Named Pipe Buffer Overflow", "fullname": "exploit/windows/smb/timbuktu_plughntcommand_bof",