CVE-2017-7494
CVE-2017-7494 copied to clipboard
SMB SessionError
Need help on this [Mon Nov 23 23:34:38 2020] I will keep the current binaries. No need for new compilation. [Mon Nov 23 23:34:38 2020] Logging into the Samba server 10.0.2.18:445 [Mon Nov 23 23:34:38 2020] Using a GUEST session [Mon Nov 23 23:34:38 2020] Using libimplantx64.so [Mon Nov 23 23:34:38 2020] Trying to copy library 'JJAnPsko.so' to share '[u'print$', u'/var/lib/samba/printers']' [Mon Nov 23 23:34:38 2020] Done! [Mon Nov 23 23:34:38 2020] Trying to copy random library JJAnPsko.so [Mon Nov 23 23:34:38 2020] Trying to load module /var/lib/samba/printers/JJAnPsko.so [Mon Nov 23 23:34:38 2020] Error: SMB SessionError: STATUS_OBJECT_NAME_NOT_FOUND(The object name is not found.)
Looks like the bug is patched
Sorry don't really understand what you mean? why the SMB SessionError?
The Samba server seems to be answering that the share library the exploit tells to load doesn't exist. This is why I believe the Samba server you're trying against might be patched already.
Want to check if this exploit is available to only v3.5 and V3.6? My version is v4.3.11.
According to what I find online it should be vulnerable, but perhaps it contains the backfix. Sorry, I have no idea.
If anyone else comes across this error, check to make sure the target box is the correct architecture. I was on Kali trying to get this exploit to work. I did not have gcc-multilib installed and so I could not compile the 32-bit exploit. Little did I know, that the box I was targeting was 32-bit. So putting a 64-bit exploit on a 32-bit box will result in this error.
I was getting the error in the image below when I tried to compile the 32-bit version of the exploit.
To fix that, you can use the following command: sudo apt-get install gcc-multilib
Reference: https://stackoverflow.com/questions/54082459/fatal-error-bits-libc-header-start-h-no-such-file-or-directory-while-compili