Metasploit mailing list archives

Test failed on sploit of the Microsoft DNS RPC vulnerability


From: soloaway at gmail.com (. Solo)
Date: Sun, 15 Apr 2007 16:29:15 +0800

Hi List,

I tested "Microsoft DNS RPC extractQuotedChar() Overflow" with
framework3. I try both of AddUser or Bind shell, however, after filled
 the blank , the exploit console window does appeared and showed the
following error message:

       =[ msf v3.0
+ -- --=[ 185 exploits - 104 payloads
+ -- --=[ 17 encoders - 5 nops
       =[ 30 aux

[*] Started bind handler
[-] Exploit failed: wrong number of arguments (2 for 1)

i am sure that I filled all of *require* blank.

could you help me to check it?

Thanks

.Solo



Current thread: