For more information, see the following links:
- One of the earliest reports AFAIK: http://seclists.org/fulldisclosure/2009/Sep/39
- Python version of exploit: http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html
Here is a link to the project (includes binaries).
Notes
- DO NOT use this tool against someone's computer! This may be a violation of law in your jurisdiction. Please use this for academic purposes only, for rebooting your own machines, for generating crash dumps for novice investigation, or for generating crash dumps when debugging other drivers or system apps when you don't have an alternative method.
- The usage is pretty simple. From a command prompt just run "crash_remotely 69.69.69.69" where 69.69.69.69 is the remote machine address.
- The project builds, as configured, to use the MSVCRT. If you are not using VC 2008, you will need the MSVCRT 9 runtime.
- The target machine must be Windows Vista or later running the srv2.sys SMB/CIFS networking share driver, and have at least one active share (basically the driver must be loaded and processing connection requests). You do not need share access, which indicates the severity and exploitability of this bug.
- It is not clear when/if this bug will be addressed by Microsoft. If the tool does not work for you, tough luck.
No comments:
Post a Comment