Metasploit modules that can be used to exploit Microsoft » Windows Me
-
MS04-011 Microsoft LSASS Service DsRolerUpgradeDownlevelServer Overflow
Disclosure Date: 2004-04-13First seen: 2020-04-26exploit/windows/smb/ms04_011_lsassThis module exploits a stack buffer overflow in the LSASS service, this vulnerability was originally found by eEye. When re-exploiting a Windows XP system, you will need need to run this module twice. DCERPC request fragmentation can be performed by setting 'FragSize' parameter. Authors: - hdm <x@hdm.io> -
MS04-011 Microsoft Private Communications Transport Overflow
Disclosure Date: 2004-04-13First seen: 2020-04-26exploit/windows/ssl/ms04_011_pctThis module exploits a buffer overflow in the Microsoft Windows SSL PCT protocol stack. This code is based on Johnny Cyberpunk's THC release and has been tested against Windows 2000 and Windows XP. To use this module, specify the remote port of any SSL service, or the port and protocol of an application that uses SSL. The only application protocol supported at this time is SMTP. You only have one chance to select the correct target, if you are attacking IIS, you may want to try one of the other exploits first (WebDAV). If WebDAV does not work, this more than likely means that this is either Windows 2000 SP4+ or Windows XP (IIS 5.0 vs IIS 5.1). Using the wrong target may not result in an immediate crash of the remote system. Authors: - hdm <x@hdm.io>
2 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details