module
Nvidia Mental Ray Satellite Service Arbitrary DLL Injection
Disclosed | Created |
---|---|
2013-12-10 | 2018-05-30 |
Disclosed
2013-12-10
Created
2018-05-30
Description
The Nvidia Mental Ray Satellite Service listens for control commands on port 7414.
When it receives the command to load a DLL (via an UNC path) it will try to
connect back to the host on port 7514. If a TCP connection is successful it will
then attempt to load the DLL. This module has been tested successfully on Win7 x64
with Nvidia Mental Ray Satellite Service v3.11.1.
When it receives the command to load a DLL (via an UNC path) it will try to
connect back to the host on port 7514. If a TCP connection is successful it will
then attempt to load the DLL. This module has been tested successfully on Win7 x64
with Nvidia Mental Ray Satellite Service v3.11.1.
Authors
Luigi Auriemma
Donato Ferrante
Ben Campbell eat_meatballs@hotmail.co.uk
Donato Ferrante
Ben Campbell eat_meatballs@hotmail.co.uk
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.