Immunity, Inc.
Name wp_wireshark_lua
CVE CVE-2011-3360
Exploit Pack White_Phosphorus
DescriptionWireshark Lua Script File Arbitrary Code Execution
NotesReferences: http://www.securityfocus.com/bid/49528
CVE Name: CVE-2011-3360
VENDOR: Wireshark
Notes:
All payloads are served over SMB via wp_smbserver_backdoor except 'Execute Command'. Windows based CANVAS users must first disable the native Windows SMB server before running the module. On Windows 7 this is done by disabling the 'Server' and 'TCP/IP NetBIOS Helper' services and rebooting the system.

This is a clientside exploit - so send the created capture zip to the target.
The target must extract both files contained in the zip to the same directory before loading the pcap to trigger the vulnerability.

Instructions:
1. Disable native SMB server and reboot
2. Run wp_wireshark_lua
3. Send created captures .zip to target

Repeatability: Unlimited
Date public: 2011-09-08
CVE Url: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360
CVSS: 6.9

Learn more about the CANVAS Exploit Pack here: White_Phosphorus