Description: This module exploits a buffer overflow in the header parsing of icecast, discovered by Luigi Auriemma. Sending 32 HTTP headers will cause a write one past the end of a pointer array. On win32 this happens to overwrite the saved instruction pointer, and on linux (depending on compiler, etc) this seems to generally overwrite nothing crucial (read not exploitable). !! This exploit uses ExitThread(), this will leave icecast thinking the thread is still in use, and the thread counter won't be decremented. This means for each time your payload exits, the counter will be left incremented, and eventually the threadpool limit will be maxed. So you can multihit, but only till you fill the threadpool.
Credits : http://www.metasploit.com/modules/exploit/windows/http/icecast_header
This video is simple demo of Icecast Exploit using metasploit. module used is exploit/windows/http/icecast_header.
Source : OnliveGamer from Youtube
Tags: Metasploit , IceCast , Exploit ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
dude.. RHOST is Remote Host, as LHOST is Local Host
thanks to Luigi Auriemma to make it public.