Land #12788, Add rds_rds_page_copy_user_priv_esc re-exploitation notes

This commit is contained in:
Brendan Coles
2020-01-04 18:24:55 +00:00
committed by Metasploit
parent 58426a730c
commit d5bd2bf24e
@@ -90,3 +90,13 @@ The executables were cross-compiled with [musl-cross](https://s3.amazonaws.com/m
meterpreter >
```
## Re-exploitation
The exploit C code utilizes a defined send (`5555`) and receive (`6666`) port, which are opened while the payload is active.
Attempt to re-exploit while a successful exploit payload is open will result in the error:
```
[*] Could not bind socket.
```
However, killing that payload will allow for the exploit to run successfully.