bump ranking up, comment about crash recovery

git-svn-id: file:///home/svn/framework3/trunk@8154 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Joshua Drake 2010-01-19 07:23:22 +00:00
parent 477468147b
commit db5097af91
1 changed files with 6 additions and 1 deletions

View File

@ -12,7 +12,7 @@
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
Rank = GoodRanking
include Msf::Exploit::Remote::MSSQL
@ -46,6 +46,11 @@ class Metasploit3 < Msf::Exploit::Remote
finally execute the payload via a "jmp esp". All addresses used were found
within the sqlservr.exe memory space, yielding very reliable code execution
using only a single query.
NOTE: The MSSQL server service does not automatically restart by default. That
said, some exceptions are caught and will not result in terminating the process.
If the exploit crashes the service prior to hijacking the stack, it won't die.
Otherwise, it's a goner.
},
'Author' => [ 'jduck' ],
'License' => MSF_LICENSE,