• MS04-011 Microsoft LSASS Service DsRolerUpgradeDownlevelServer Overflow
    Disclosure Date: 2004-04-13
    First seen: 2020-04-26
    exploit/windows/smb/ms04_011_lsass
    This module exploits a stack buffer overflow in the LSASS service, this vulnerability was originally found by eEye. When re-exploiting a Windows XP system, you will need need to run this module twice. DCERPC request fragmentation can be performed by setting 'FragSize' parameter. Authors: - hdm <x@hdm.io>
  • MS04-011 Microsoft Private Communications Transport Overflow
    Disclosure Date: 2004-04-13
    First seen: 2020-04-26
    exploit/windows/ssl/ms04_011_pct
    This module exploits a buffer overflow in the Microsoft Windows SSL PCT protocol stack. This code is based on Johnny Cyberpunk's THC release and has been tested against Windows 2000 and Windows XP. To use this module, specify the remote port of any SSL service, or the port and protocol of an application that uses SSL. The only application protocol supported at this time is SMTP. You only have one chance to select the correct target, if you are attacking IIS, you may want to try one of the other exploits first (WebDAV). If WebDAV does not work, this more than likely means that this is either Windows 2000 SP4+ or Windows XP (IIS 5.0 vs IIS 5.1). Using the wrong target may not result in an immediate crash of the remote system. Authors: - hdm <x@hdm.io>
2 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!