module
Microsoft Windows 7 / Server 2008 R2 SMB Client Infinite Loop
Disclosed | Created |
---|---|
01/01/1970 | 05/30/2018 |
Disclosed
01/01/1970
Created
05/30/2018
Description
This module exploits a denial of service flaw in the Microsoft
Windows SMB client on Windows 7 and Windows Server 2008 R2. To trigger
this bug, run this module as a service and forces a vulnerable client
to access the IP of this system as an SMB server. This can be accomplished
by embedding a UNC path (\HOST\share\something) into a web page if the
target is using Internet Explorer, or a Word document otherwise.
Windows SMB client on Windows 7 and Windows Server 2008 R2. To trigger
this bug, run this module as a service and forces a vulnerable client
to access the IP of this system as an SMB server. This can be accomplished
by embedding a UNC path (\HOST\share\something) into a web page if the
target is using Internet Explorer, or a Word document otherwise.
Authors
Laurent Gaffie hdm
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use auxiliary/dos/windows/smb/ms10_006_negotiate_response_loop msf /(p) > show actions ...actions... msf /(p) > set ACTION < action-name > msf /(p) > show options ...show and set options... msf /(p) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.