This is a general-purpose module for exploiting conditions where a DLL can be loaded from an specified SMB share. This Metasploit module serves payloads as DLLs over an SMB service.
aa75d9a0bba7262b8da60d2a895a26ef088b4c19238a4ab8a840bc09863ca240
This is a general-purpose module for exploiting conditions where a HTTP request triggers a DLL load from an specified SMB share. This Metasploit module serves payloads as DLLs over an SMB service and allows an arbitrary HTTP URL to be called that would trigger the load of the DLL.
a573762660008870b62d9b2185839f0e1170cdf2de7200693235f52be52f8d35
Mu Dynamics has discovered vulnerabilities in GnuTLS and Libtasn1. The block cipher decryption logic in GnuTLS assumed that a record containing any data which was a multiple of the block size was valid for further decryption processing, leading to a heap corruption vulnerability. Various functions using the ASN.1 length decoding logic in Libtasn1 were incorrectly assuming that the return value from asn1_get_length_der is always less than the length of the enclosing ASN.1 structure, which is only true for valid structures and not for intentionally corrupt or otherwise buggy structures.
5c22831c56b5d7f5cefb792251ddbea761d9ea8806a0c02c5e304b7b960abf12