Vulnerability & Exploit Database

Back to search

Windows RSH Daemon Buffer Overflow

This module exploits a vulnerability in Windows RSH daemon 1.8. The vulnerability is due to a failure to check for the length of input sent to the RSH server. A CPORT of 512 -> 1023 must be configured for the exploit to be successful.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/misc/windows_rsh

Authors

  • MC <mc [at] metasploit.com>

References

Targets

  • Windows 2003 SP1 English
  • Windows XP Pro SP2 English
  • Windows 2000 Pro SP4 English

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/misc/windows_rsh msf exploit(windows_rsh) > show targets ...targets... msf exploit(windows_rsh) > set TARGET <target-id> msf exploit(windows_rsh) > show options ...show and set options... msf exploit(windows_rsh) > exploit