I was not able to trigger this with a standalone test case, but it is easy to reproduce using the svn version of the Metasploit Framework. The example below assumes you have a Windows server somewhere with port 135 open:
$ svn co http://metasploit.com/svn/framework3/trunk/ msf3 $ ruby msf3/msfcli exploit/windows/dcerpc/ms03_026_dcom PAYLOAD=windows/shell/bind_tcp RHOST=10.10.10.250 E (change 10.10.10.250 to a machine with DCOM open, patch level does not matter) [*] Started bind handler [*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal... [*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:[EMAIL PROTECTED]:10.10.10.250[135] ... [*] Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:[EMAIL PROTECTED]:10.10.10.250[135] ... [-] Exploit failed: uninitialized constant Msf::ModuleSet::NDR A working/patched version of Ruby will not trigger that "uninitialized constant" error. -HD -- Ruby 1.8 package breaks the Metasploit Framework (short-named constants) https://bugs.launchpad.net/bugs/282302 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
