module

MS00-094 Microsoft IIS Phone Book Service Overflow

Disclosed
2000-12-04
Created
2018-05-30

Description

This is an exploit for the Phone Book Service /pbserver/pbserver.dll
described in MS00-094. By sending an overly long URL argument
for phone book updates, it is possible to overwrite the stack. This
module has only been tested against Windows 2000 SP1.

Author

aushack patrick@osisecurity.com.au

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/isapi/ms00_094_pbserver
msf exploit(ms00_094_pbserver) > show targets
...targets...
msf exploit(ms00_094_pbserver) > set TARGET < target-id >
msf exploit(ms00_094_pbserver) > show options
...show and set options...
msf exploit(ms00_094_pbserver) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.