module

Procyon Core Server HMI Coreservice.exe Stack Buffer Overflow

Disclosed
2011-09-08
Created
2018-05-30

Description

This module exploits a vulnerability in the coreservice.exe component of Proycon
Core Server fails to do proper bounds checking before copying data into a small buffer on the stack.
This causes a buffer overflow and allows to overwrite a structured exception handling
record on the stack, allowing for unauthenticated remote code execution. Also, after the
payload exits, Coreservice.exe should automatically recover.

Authors

Knud Hojgaard keh@nsense.dk
mr_me steventhomasseeley@gmail.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/scada/procyon_core_server
msf exploit(procyon_core_server) > show targets
...targets...
msf exploit(procyon_core_server) > set TARGET < target-id >
msf exploit(procyon_core_server) > show options
...show and set options...
msf exploit(procyon_core_server) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.