Back to search

MS04-011 Microsoft LSASS Service DsRolerUpgradeDownlevelServer Overflow

This module exploits a stack buffer overflow in the LSASS service, this vulnerability was originally found by eEye. When re-exploiting a Windows XP system, you will need need to run this module twice. DCERPC request fragmentation can be performed by setting 'FragSize' parameter.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/smb/ms04_011_lsass

Authors

  • hdm <x [at] hdm.io>

References

Targets

  • Automatic Targetting
  • Windows 2000 English
  • Windows XP English

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/smb/ms04_011_lsass msf exploit(ms04_011_lsass) > show targets ...targets... msf exploit(ms04_011_lsass) > set TARGET <target-id> msf exploit(ms04_011_lsass) > show options ...show and set options... msf exploit(ms04_011_lsass) > exploit

Related Vulnerabilities