|
|
Subscribe / Log in / New account

Security

Metasploit 3.0

March 28, 2007

This article was contributed by Jake Edge.

The Metasploit Framework, a popular open source framework for penetration testing and security tool development, has just released its 3.0 version that provides many new features. The framework has been completely rewritten from version 2, moving from Perl to Ruby in the process. In many ways, Metasploit 3 seeks to be the swiss army knife of network vulnerability research and testing, providing a wealth of tools for security researchers.

At its core, Metasploit provides a means to launch an exploit at a particular host, execute the payload and provide a shell that communicates with the payload. The exploits provided with the framework are known vulnerabilities for various operating systems and the payloads are different ways to execute a shell on the exploited machine. This allows users to probe hosts for susceptibility to known attacks and to combine those attacks with different ways of getting a shell in an attempt to avoid firewall and intrusion detection rules. In addition, Metasploit makes it easy to add new payloads and exploits so that a researcher can develop or work with entirely new vulnerabilities using the familiar framework interface.

Once Metasploit has connected to an exploited system, an irb (interactive ruby) shell from within the framework can be used to script access to any accessible process on the remote system. Because it provides a means to read and write the memory of those processes, credentials like passwords could be grabbed or processes could be backdoored in various ways. Another interesting feature allows an attacker to route all Metasploit traffic through a compromised host, potentially bypassing firewalls and routers. This is just a small sample of the tools that are provided; this is a very potent toolkit.

There are two main interfaces to Metasploit, a console interface as well as an AJAX-enabled web interface that is driven with Ruby on Rails. Both provide tab-completion of commands and arguments and are very convenient to use. The web interface, however, feels rather sluggish, even running on the local machine; it is mostly provided to allow demonstrations of using the tool. There is also a command-line interface that can be used from scripts and the like, but the console is the main interface workhorse.

The release comes with both a user and a developer guide and both are quite readable and useful. The developer guide lays out the rationale behind the switch to Ruby which makes for an interesting read. It notes that Windows compatibility was one of the major reasons for the switch, which makes it rather surprising that deficiencies in either Ruby for Windows or Windows itself make some features (the entire console interface for instance) usable only on Linux or other UNIX systems.

Metasploit was already an incredibly useful tool and it would appear that version 3 takes a big step forward. As with all security tools, it can be used for good or ill, but it is most certainly an essential arrow in the quiver of anyone tasked with or interested in computer security.

Comments (3 posted)

New vulnerabilities

cups: denial of service

Package(s):cups CVE #(s):CVE-2007-0720
Created:March 26, 2007 Updated:February 7, 2008
Description: Previous versions of the cups package could be forced to hang via a client "partially negotiating" an ssl connection. In this state, cups would not allow other connections to be made, a denial of service.
Alerts:
Gentoo 201412-11 emul-linux-x86-baselibs 2014-12-11
Mandriva MDVSA-2008:036 cups 2007-02-06
Mandriva MDKSA-2007:086 cups 2007-04-16
Red Hat RHSA-2007:0123-01 CUPS 2007-04-16
Gentoo 200703-28 cups 2007-03-31
Foresight FLEA-2007-0003-1 cups 2007-03-25

Comments (none posted)

evolution: format string error

Package(s):evolution CVE #(s):CVE-2007-1002
Created:March 27, 2007 Updated:February 27, 2008
Description: A format string error in the "write_html()" function in calendar/gui/ e-cal-component-memo-preview.c when displaying a memo's categories can potentially be exploited to execute arbitrary code via a specially crafted shared memo containing format specifiers.
Alerts:
SuSE SUSE-SR:2007:015 PHP, moodle, tomcat5, lighttpd, asterisk, libarchive, xpdf, evolution, kvirc, wireshark, gd, opera, clamav, gimp 2007-08-03
Gentoo 200706-02 evolution 2007-06-06
Red Hat RHSA-2007:0158-01 evolution 2007-05-03
Foresight FLEA-2007-0010-1 evolution 2007-04-05
Fedora FEDORA-2007-404 evolution 2007-04-04
Fedora FEDORA-2007-393 evolution 2007-04-04
Mandriva MDKSA-2007:070 evolution 2007-03-27

Comments (1 posted)

file: arbitrary code execution

Package(s):file CVE #(s):CVE-2007-1536
Created:March 22, 2007 Updated:May 30, 2007
Description: The "file" utility incorrectly checks the allocated heap memory size. If a remote attacker can trick a user into looking at specially crafted files with file, arbitrary code can be executed with the user's privileges.
Alerts:
Gentoo 201412-11 emul-linux-x86-baselibs 2014-12-11
Red Hat RHSA-2007:0391-01 file 2007-05-30
Slackware SSA:2007-093-01 file 2007-04-04
Gentoo 200703-26 file 2007-03-30
Debian DSA-1274-1 file 2007-04-02
Fedora FEDORA-2007-391 file 2007-03-30
Red Hat RHSA-2007:0124-01 file 2007-03-23
Mandriva MDKSA-2007:067 file 2007-03-22
rPath rPSA-2007-0059-1 file 2007-03-22
Ubuntu USN-439-1 file 2007-03-21

Comments (1 posted)

firefox: FTP PASV port-scanning

Package(s):firefox seamonkey CVE #(s):CVE-2007-1562
Created:March 23, 2007 Updated:June 4, 2007
Description: According to this advisory, the FTP protocol includes the PASV (passive) command which is used by Firefox to request an alternate data port. The specification of the FTP protocol allows the server response to include an alternate server address as well, although this is rarely used in practice.
Alerts:
Fedora FEDORA-2007-0066 seamonkey 2007-06-01
Fedora FEDORA-2007-0050 galeon 2007-06-01
Fedora FEDORA-2007-0001 epiphany 2007-06-04
rPath rPSA-2007-0112-1 firefox 2007-05-31
Foresight FLEA-2007-0023-1 firefox 2007-05-31
Fedora FEDORA-2007-0001 yelp 2007-06-01
Fedora FEDORA-2007-0001 firefox 2007-06-01
Fedora FEDORA-2007-0001 devhelp 2007-06-01
Fedora FEDORA-2007-554 firefox 2007-05-31
Fedora FEDORA-2007-549 yelp 2007-05-31
Fedora FEDORA-2007-549 firefox 2007-05-31
Fedora FEDORA-2007-549 devhelp 2007-05-31
Fedora FEDORA-2007-549 epiphany 2007-05-31
Red Hat RHSA-2007:0402-01 seamonkey 2007-05-30
Red Hat RHSA-2007:0400-01 firefox 2007-05-30
rPath rPSA-2007-0062-1 firefox 2007-04-04
Ubuntu USN-443-1 firefox 2007-03-27
Foresight FLEA-2007-0001-1 firefox 2007-03-22

Comments (1 posted)

mysql: denial of service

Package(s):mysql CVE #(s):CVE-2007-1420
Created:March 22, 2007 Updated:May 21, 2008
Description: MySQL subselect queries using "ORDER BY" can be used by an attacker with access to a MySQL instance in order to create an intermittent denial of service.
Alerts:
Red Hat RHSA-2008:0364-01 mysql 2008-05-21
Mandriva MDKSA-2007:139 MySQL 2007-07-04
rPath rPSA-2007-0107-1 mysql 2007-05-23
Gentoo 200705-11 mysql 2007-05-08
Ubuntu USN-440-1 mysql-dfsg-5.0 2007-03-21

Comments (none posted)

squid: denial of service

Package(s):squid CVE #(s):CVE-2007-1560
Created:March 23, 2007 Updated:April 3, 2007
Description: Due to an internal error Squid-2.6 is vulnerable to a denial of service attack when processing the TRACE request method. This problem allows any client trusted to use the service to perform a denial of service attack on the Squid service.
Alerts:
Red Hat RHSA-2007:0131-01 squid 2007-04-03
Gentoo 200703-27 squid 2007-03-31
SuSE SUSE-SR:2007:005 xine-lib, tomcat, unrar, squid, file 2007-03-30
Mandriva MDKSA-2007:068 squid 2006-03-22

Comments (none posted)

xmms: BMP handling vulnerability

Package(s):xmms CVE #(s):CVE-2007-0653 CVE-2007-0654
Created:March 28, 2007 Updated:July 26, 2011
Description: xmms suffers from vulnerabilities in its handling of BMP images. Should a hostile image be included in an xmms skin, it could lead to code execution on the user's system.
Alerts:
Fedora FEDORA-2011-9421 xmms 2011-07-16
Fedora FEDORA-2011-9413 xmms 2011-07-16
Debian DSA-1277-1 xmms 2007-04-04
Mandriva MDKSA-2007:071 xmms 2007-03-29
Ubuntu USN-445-1 xmms 2007-03-27

Comments (none posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2007, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds