Metasploit mailing list archives

RE: Possible UCE::[framework] Exploit for the Microsoft DNS RPC vulnerability...


From: Jeff.Peadro at allstate.com (Peadro, Jeff)
Date: Sat, 14 Apr 2007 20:03:27 -0500

I am attempting to test this against a W2K DNS Server from a host
running XP SP2; the payload being generic/shell_bind_tcp.  My Rhost is
set to the DNS server, Rport is set to 1030 and Lport being 4444.

Upon clicking "Launch Exploit" I receive the following error:

[*] Started bind handler
[-] Exploit failed: wrong number of arguments (2 for 1)

Any thoughts?

-----Original Message-----
From: H D Moore [mailto:hdm at metasploit.com] 
Sent: Saturday, April 14, 2007 10:23 AM
To: framework at metasploit.com
Subject: Possible UCE::[framework] Exploit for the Microsoft DNS RPC
vulnerability...

This module has been added to the development version of Metasploit 3,
it 
will be merged to 3.0-stable once 2003 support has been completed:

http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/dcer
pc/msdns_zonename.rb

-HD



Current thread: