Metasploit mailing list archives

cve-2010-1799


From: Craig Freyman <craigfreyman () gmail com>
Date: Tue, 17 Aug 2010 11:52:41 -0600

I'm having problems with the cve-2010-1799 exploit:

-] Exception handling request: Connection reset by peer

/opt/metasploit3/msf3/lib/rex/io/stream.rb:44:in `syswrite'
/opt/metasploit3/msf3/lib/rex/io/stream.rb:44:in `write'
/opt/metasploit3/msf3/lib/rex/io/stream.rb:138:in `timed_write'
/opt/metasploit3/msf3/lib/rex/io/stream.rb:169:in `put'
/opt/metasploit3/msf3/lib/rex/proto/http/server.rb:44:in `send_response'
/opt/metasploit3/msf3/lib/msf/core/exploit/http/server.rb:293:in
`send_response'
(eval):119:in `on_request_uri'
/opt/metasploit3/msf3/lib/msf/core/exploit/http/server.rb:102
/opt/metasploit3/msf3/lib/rex/proto/http/handler/proc.rb:37:in `call'
/opt/metasploit3/msf3/lib/rex/proto/http/handler/proc.rb:37:in `on_request'
/opt/metasploit3/msf3/lib/rex/proto/http/server.rb:347:in `dispatch_request'
/opt/metasploit3/msf3/lib/rex/proto/http/server.rb:286:in `on_client_data'
/opt/metasploit3/msf3/lib/rex/proto/http/server.rb:143
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:45:in `call'
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:45:in `on_client_data'
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:182:in `monitor_clients'
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:180:in `each'
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:180:in `monitor_clients'
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:69:in `start'
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:68:in `initialize'
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:68:in `new'
/opt/metasploit3/msf3/lib/rex/io/stream_server.rb:68:in `start'
/opt/metasploit3/msf3/lib/rex/proto/http/server.rb:146:in `start'
/opt/metasploit3/msf3/lib/rex/service_manager.rb:80:in `start'
/opt/metasploit3/msf3/lib/rex/service_manager.rb:24:in `start'
/opt/metasploit3/msf3/lib/msf/core/exploit/http/server.rb:85:in
`start_service'
/opt/metasploit3/msf3/lib/msf/core/exploit/tcp.rb:307:in `exploit'
/opt/metasploit3/msf3/lib/msf/core/exploit_driver.rb:201:in `job_run_proc'
/opt/metasploit3/msf3/lib/msf/core/exploit_driver.rb:148
/opt/metasploit3/msf3/lib/rex/job_container.rb:36:in `call'
/opt/metasploit3/msf3/lib/rex/job_container.rb:36:in `start'
/opt/metasploit3/msf3/lib/rex/job_container.rb:31:in `initialize'
/opt/metasploit3/msf3/lib/rex/job_container.rb:31:in `new'
/opt/metasploit3/msf3/lib/rex/job_container.rb:31:in `start'
/opt/metasploit3/msf3/lib/rex/job_container.rb:155:in `start_bg_job'
/opt/metasploit3/msf3/lib/msf/core/exploit_driver.rb:145:in `run'
/opt/metasploit3/msf3/lib/msf/base/simple/exploit.rb:125:in `exploit_simple'
/opt/metasploit3/msf3/lib/msf/base/simple/exploit.rb:147:in `exploit_simple'
/opt/metasploit3/msf3/lib/msf/ui/console/command_dispatcher/exploit.rb:145:in
`cmd_exploit'
/opt/metasploit3/msf3/lib/rex/ui/text/dispatcher_shell.rb:246:in `send'
/opt/metasploit3/msf3/lib/rex/ui/text/dispatcher_shell.rb:246:in
`run_command'
/opt/metasploit3/msf3/lib/rex/ui/text/dispatcher_shell.rb:208:in
`run_single'
/opt/metasploit3/msf3/lib/rex/ui/text/dispatcher_shell.rb:202:in `each'
/opt/metasploit3/msf3/lib/rex/ui/text/dispatcher_shell.rb:202:in
`run_single'
/opt/metasploit3/msf3/lib/rex/ui/text/shell.rb:141:in `run'
/usr/local/bin/msfconsole:117
[*] Sending Apple QuickTime 7.6.6 Invalid SMIL URI Buffer Overflow exploit
to 192.168.1.127:2161...
[*] Trying target Apple QuickTime Player 7.6.6...
[*] Sending Apple QuickTime 7.6.6 Invalid SMIL URI Buffer Overflow init HTML
to 192.168.1.127:2165...
[*] Sending Apple QuickTime 7.6.6 Invalid SMIL URI Buffer Overflow exploit
to 192.168.1.127:2167...
[*] Trying target Apple QuickTime Player 7.6.6...
[-] Exception handling request: Connection reset by peer

any ideas?
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: