Skip to content

Commit 580e2b3

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 97b84b0 commit 580e2b3

File tree

1 file changed

+63
-14
lines changed

1 file changed

+63
-14
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -89704,7 +89704,7 @@
8970489704
"Jun Mao",
8970589705
8970689706
],
89707-
"description": "This exploits a memory corruption vulnerability present in Samba versions\n prior to 3.3.13. When handling chained response packets, Samba fails to validate\n the offset value used when building the next part. By setting this value to a\n number larger than the destination buffer size, an attacker can corrupt memory.\n Additionally, setting this value to a value smaller than 'smb_wct' (0x24) will\n cause the header of the input buffer chunk to be corrupted.\n\n After close inspection, it appears that 3.0.x versions of Samba are not\n exploitable. Since they use an \"InputBuffer\" size of 0x20441, an attacker cannot\n cause memory to be corrupted in an exploitable way. It is possible to corrupt the\n heap header of the \"InputBuffer\", but it didn't seem possible to get the chunk\n to be processed again prior to process exit.\n\n In order to gain code execution, this exploit attempts to overwrite a \"talloc\n chunk\" destructor function pointer.\n\n This particular module is capable of exploiting the flaw on x86 Linux systems\n that do not have the nx memory protection.\n\n NOTE: It is possible to make exploitation attempts indefinitely since Samba forks\n for user sessions in the default configuration.",
89707+
"description": "This exploits a memory corruption vulnerability present in Samba versions\n prior to 3.3.13. When handling chained response packets, Samba fails to validate\n the offset value used when building the next part. By setting this value to a\n number larger than the destination buffer size, an attacker can corrupt memory.\n Additionally, setting this value to a value smaller than 'smb_wct' (0x24) will\n cause the header of the input buffer chunk to be corrupted.\n\n After close inspection, it appears that 3.0.x versions of Samba are not\n exploitable. Since they use an \"InputBuffer\" size of 0x20441, an attacker cannot\n cause memory to be corrupted in an exploitable way. It is possible to corrupt the\n heap header of the \"InputBuffer\", but it didn't seem possible to get the chunk\n to be processed again prior to process exit.\n\n In order to gain code execution, this exploit attempts to overwrite a \"talloc\n chunk\" destructor function pointer.\n\n This particular module is capable of exploiting the flaw on x86 Linux systems\n that do not have the nx memory protection.\n\n NOTE: It is possible to make exploitation attempts indefinitely since Samba forks\n for user sessions in the default configuration.",
8970889708
"references": [
8970989709
"CVE-2010-2063",
8971089710
"OSVDB-65518",
@@ -89725,14 +89725,24 @@
8972589725
"Linux (Debian5 3.2.5-4lenny6)",
8972689726
"Debugging Target"
8972789727
],
89728-
"mod_time": "2020-10-02 17:38:06 +0000",
89728+
"mod_time": "2025-06-15 00:09:09 +0000",
8972989729
"path": "/modules/exploits/linux/samba/chain_reply.rb",
8973089730
"is_install_path": true,
8973189731
"ref_name": "linux/samba/chain_reply",
8973289732
"check": false,
8973389733
"post_auth": false,
8973489734
"default_credential": false,
89735-
"notes": {},
89735+
"notes": {
89736+
"Stability": [
89737+
"crash-service-restarts"
89738+
],
89739+
"SideEffects": [
89740+
"ioc-in-logs"
89741+
],
89742+
"Reliability": [
89743+
"unreliable-session"
89744+
]
89745+
},
8973689746
"session_types": false,
8973789747
"needs_cleanup": null
8973889748
},
@@ -89748,7 +89758,7 @@
8974889758
8974989759
"bcoles <[email protected]>"
8975089760
],
89751-
"description": "This module triggers an arbitrary shared library load vulnerability\n in Samba versions 3.5.0 to 4.4.14, 4.5.10, and 4.6.4. This module\n requires valid credentials, a writeable folder in an accessible share,\n and knowledge of the server-side path of the writeable folder. In\n some cases, anonymous access combined with common filesystem locations\n can be used to automatically exploit this vulnerability.",
89761+
"description": "This module triggers an arbitrary shared library load vulnerability\n in Samba versions 3.5.0 to 4.4.14, 4.5.10, and 4.6.4. This module\n requires valid credentials, a writeable folder in an accessible share,\n and knowledge of the server-side path of the writeable folder. In\n some cases, anonymous access combined with common filesystem locations\n can be used to automatically exploit this vulnerability.",
8975289762
"references": [
8975389763
"CVE-2017-7494",
8975489764
"URL-https://www.samba.org/samba/security/CVE-2017-7494.html"
@@ -89782,14 +89792,24 @@
8978289792
"Linux SPARC64",
8978389793
"Linux s390x"
8978489794
],
89785-
"mod_time": "2023-03-05 14:30:47 +0000",
89795+
"mod_time": "2025-06-15 00:09:09 +0000",
8978689796
"path": "/modules/exploits/linux/samba/is_known_pipename.rb",
8978789797
"is_install_path": true,
8978889798
"ref_name": "linux/samba/is_known_pipename",
8978989799
"check": true,
8979089800
"post_auth": true,
8979189801
"default_credential": false,
89792-
"notes": {},
89802+
"notes": {
89803+
"Stability": [
89804+
"crash-safe"
89805+
],
89806+
"SideEffects": [
89807+
"ioc-in-logs"
89808+
],
89809+
"Reliability": [
89810+
"repeatable-session"
89811+
]
89812+
},
8979389813
"session_types": false,
8979489814
"needs_cleanup": null
8979589815
},
@@ -89805,7 +89825,7 @@
8980589825
"Adriano Lima <[email protected]>",
8980689826
8980789827
],
89808-
"description": "This module triggers a heap overflow in the LSA RPC service\n of the Samba daemon. This module uses the TALLOC chunk overwrite\n method (credit Ramon and Adriano), which only works with Samba\n versions 3.0.21-3.0.24. Additionally, this module will not work\n when the Samba \"log level\" parameter is higher than \"2\".",
89828+
"description": "This module triggers a heap overflow in the LSA RPC service\n of the Samba daemon. This module uses the TALLOC chunk overwrite\n method (credit Ramon and Adriano), which only works with Samba\n versions 3.0.21-3.0.24. Additionally, this module will not work\n when the Samba \"log level\" parameter is higher than \"2\".",
8980989829
"references": [
8981089830
"CVE-2007-2446",
8981189831
"OSVDB-34699"
@@ -89832,14 +89852,24 @@
8983289852
"Linux Heap Brute Force (OpenWRT MIPS)",
8983389853
"DEBUG"
8983489854
],
89835-
"mod_time": "2020-10-02 17:38:06 +0000",
89855+
"mod_time": "2025-06-15 00:09:09 +0000",
8983689856
"path": "/modules/exploits/linux/samba/lsa_transnames_heap.rb",
8983789857
"is_install_path": true,
8983889858
"ref_name": "linux/samba/lsa_transnames_heap",
8983989859
"check": true,
8984089860
"post_auth": false,
8984189861
"default_credential": false,
89842-
"notes": {},
89862+
"notes": {
89863+
"Stability": [
89864+
"crash-service-restarts"
89865+
],
89866+
"Reliability": [
89867+
"repeatable-session"
89868+
],
89869+
"SideEffects": [
89870+
"ioc-in-logs"
89871+
]
89872+
},
8984389873
"session_types": false,
8984489874
"needs_cleanup": null
8984589875
},
@@ -89857,7 +89887,7 @@
8985789887
"sinn3r <[email protected]>",
8985889888
"juan vazquez <[email protected]>"
8985989889
],
89860-
"description": "This module triggers a vulnerability in the LSA RPC service of the Samba daemon\n because of an error on the PIDL auto-generated code. Making a specially crafted\n call to SetInformationPolicy to set a PolicyAuditEventsInformation allows to\n trigger a heap overflow and finally execute arbitrary code with root privileges.\n\n The module uses brute force to guess the stackpivot/rop chain or the system()\n address and redirect flow there in order to bypass NX. The start and stop addresses\n for brute forcing have been calculated empirically. On the other hand the module\n provides the StartBrute and StopBrute which allow the user to configure his own\n addresses.",
89890+
"description": "This module triggers a vulnerability in the LSA RPC service of the Samba daemon\n because of an error on the PIDL auto-generated code. Making a specially crafted\n call to SetInformationPolicy to set a PolicyAuditEventsInformation allows to\n trigger a heap overflow and finally execute arbitrary code with root privileges.\n\n The module uses brute force to guess the stackpivot/rop chain or the system()\n address and redirect flow there in order to bypass NX. The start and stop addresses\n for brute forcing have been calculated empirically. On the other hand the module\n provides the StartBrute and StopBrute which allow the user to configure his own\n addresses.",
8986189891
"references": [
8986289892
"CVE-2012-1182",
8986389893
"OSVDB-81303",
@@ -89883,14 +89913,24 @@
8988389913
"2:3.5.6~dfsg-3squeeze6 on Debian Squeeze",
8988489914
"3.5.10-0.107.el5 on CentOS 5"
8988589915
],
89886-
"mod_time": "2020-10-02 17:38:06 +0000",
89916+
"mod_time": "2025-06-15 00:09:09 +0000",
8988789917
"path": "/modules/exploits/linux/samba/setinfopolicy_heap.rb",
8988889918
"is_install_path": true,
8988989919
"ref_name": "linux/samba/setinfopolicy_heap",
8989089920
"check": true,
8989189921
"post_auth": false,
8989289922
"default_credential": false,
89893-
"notes": {},
89923+
"notes": {
89924+
"Stability": [
89925+
"crash-service-restarts"
89926+
],
89927+
"Reliability": [
89928+
"unreliable-session"
89929+
],
89930+
"SideEffects": [
89931+
"ioc-in-logs"
89932+
]
89933+
},
8989489934
"session_types": false,
8989589935
"needs_cleanup": null
8989689936
},
@@ -89905,7 +89945,7 @@
8990589945
8990689946
8990789947
],
89908-
"description": "This exploits the buffer overflow found in Samba versions\n 2.2.0 to 2.2.8. This particular module is capable of\n exploiting the flaw on x86 Linux systems that do not\n have the noexec stack option set.\n\n NOTE: Some older versions of RedHat do not seem to be vulnerable\n since they apparently do not allow anonymous access to IPC.",
89948+
"description": "This exploits the buffer overflow found in Samba versions\n 2.2.0 to 2.2.8. This particular module is capable of\n exploiting the flaw on x86 Linux systems that do not\n have the noexec stack option set.\n\n NOTE: Some older versions of RedHat do not seem to be vulnerable\n since they apparently do not allow anonymous access to IPC.",
8990989949
"references": [
8991089950
"CVE-2003-0201",
8991189951
"OSVDB-4469",
@@ -89926,7 +89966,7 @@
8992689966
"targets": [
8992789967
"Samba 2.2.x - Bruteforce"
8992889968
],
89929-
"mod_time": "2025-02-23 18:58:52 +0000",
89969+
"mod_time": "2025-06-15 00:09:09 +0000",
8993089970
"path": "/modules/exploits/linux/samba/trans2open.rb",
8993189971
"is_install_path": true,
8993289972
"ref_name": "linux/samba/trans2open",
@@ -89936,6 +89976,15 @@
8993689976
"notes": {
8993789977
"AKA": [
8993889978
"ECHOWRECKER"
89979+
],
89980+
"Stability": [
89981+
"crash-service-restarts"
89982+
],
89983+
"Reliability": [
89984+
"repeatable-session"
89985+
],
89986+
"SideEffects": [
89987+
"ioc-in-logs"
8993989988
]
8994089989
},
8994189990
"session_types": false,

0 commit comments

Comments
 (0)