-
Notifications
You must be signed in to change notification settings - Fork 14.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2019-0708 / BlueKeep scanner: license errors are not handled #12149
Comments
Looking into this. Will report back with fix or notes. |
Can you retest with |
Sorry I forgot to include the options or to mention it, but this is already a verbose output. |
Ah, gotcha, you're right. But that would indicate there's a read failure on the font list PDU. The license packet actually passes, since apparently I don't know how to use my eyes. Please see if #12152 fixes the issues. |
Ok for #12152 :) However, I have noticed that it continues to fail against other hosts (which also return license errors in other tools). Sorry for missing it first but it fails at a different step ("sending patch check payloads" instead of "sending client font list PDU" that you fixed):
|
Suggested and tested fix: diff --git a/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb b/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
index 844719754b..d4a4a93c68 100644
--- a/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
+++ b/modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
@@ -207,7 +207,11 @@ class MetasploitModule < Msf::Auxiliary
rdp_send(x64_packet)
# Quick check for the Ultimatum PDU
- res = sock.get_once(-1, 1)
+ begin
+ res = sock.get_once(-1, 1)
+ rescue EOFError
+ raise RdpCommunicationError
+ end
return Exploit::CheckCode::Vulnerable if res && res.include?(["0300000902f0802180"].pack("H*"))
# Slow check for Ultimatum PDU. If it doesn't respond in a timely However the output is different with this:
"The target service is running, but could not be validated" VS "Cannot reliably check exploitability" |
If the server doesn't respond to the patch check, it's assumed to be likely patched (see slow check below). |
Steps to reproduce
Run the scanner/rdp/cve_2019_0708_bluekeep scanner module against an RDP server which returns a license error.
Here are similar issues and ways of discovering such servers:
https://github.com/zerosum0x0/CVE-2019-0708/issues/16
robertdavidgraham/rdpscan#25
Expected behavior
The module gracefully handles the error and report the host as not vulnerable.
Current behavior
I get the following error:
System stuff
Metasploit version
I use the latest MSF version from Git (metasploit v5.0.39-dev-6bd7f6cb4a)
I installed Metasploit with:
OS
Kali
The text was updated successfully, but these errors were encountered: