This exploit targets a remote code execution vulnerability in Samba 3.x by leveraging a heap overflow to overwrite memory structures and execute arbitrary commands. It includes a connect-back shell mechanism and supports multiple targets with predefined offsets.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:Samba 3.x (e.g., 3.6.3, 3.5.11)
No auth needed
Prerequisites:Network access to the Samba service · Samba service running on a vulnerable version