This Metasploit module exploits the MS12-020 RDP vulnerability originally discovered and reported by Luigi Auriemma. The flaw can be found in the way the T.125 ConnectMCSPDU packet is handled in the maxChannelIDs field, which will result an invalid pointer being used, therefore causing a denial-of-service condition.
65f6cf47ec80739aebde264685f63dfdec8a0624d51f0c15702c7607a260ba99
This exploit leverages a file write vulnerability in the print spooler service which will restart if stopped. Because the service cannot be stopped long enough to remove the dll, there is no way to remove the dll once it is loaded by the service. Essentially, on default settings, this module adds a permanent elevated backdoor.
042eb96d4be3493ee746dfaae2491220ba9b12278e37c6ccaaa1b2d1f175f42f