Merge branch 'release/2012030701' of r7.github.com:rapid7/metasploit-framework into release/2012030701

unstable
Jonathan Cran 2012-03-08 10:23:46 -06:00
commit 046857f3ab
5 changed files with 10 additions and 10 deletions

View File

@ -17,9 +17,9 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info, super(update_info(info,
'Name' => 'Apple Filing Protocol Info Enumerator', 'Name' => 'Apple Filing Protocol Info Enumerator',
'Description' => %q{ 'Description' => %q{
This module fetch AFP server information. This module fetches AFP server information, including server name,
Including Server name, network address, supported AFP versions, network address, supported AFP versions, signature, machine type,
signature, machine type ,and server flags. and server flags.
}, },
'References' => 'References' =>
[ [

View File

@ -18,8 +18,8 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info, super(update_info(info,
'Name' => 'MongoDB Login Utility', 'Name' => 'MongoDB Login Utility',
'Description' => %q{ 'Description' => %q{
This module scans for MongoDB server. By default MongoDB has no auth. If auth This module attempts to brute force authentication credentials for MongoDB.
is used, it is then possible to execute a brute force attack on the server. Note that, by default, MongoDB does not require authentication.
}, },
'References' => 'References' =>
[ [

View File

@ -17,9 +17,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => "ASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow", 'Name' => "ASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow",
'Description' => %q{ 'Description' => %q{
This module exploits a vulnerability found in ASUS Net4Switch's ipswcom.dll This module exploits a vulnerability found in ASUS Net4Switch's ipswcom.dll
ActiveX control. A buffer overflow condition is possible in multiple places all ActiveX control. A buffer overflow condition is possible in multiple places due
because of the poor use of the CxDbgPrint() function, which allows remote attackers to the use of the CxDbgPrint() function, which allows remote attackers to gain
to gain arbitrary code execution under the context of the user. arbitrary code execution under the context of the user.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>

View File

@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => 'IBM Personal Communications I-Series Access WorkStation 5.9 Profile', 'Name' => 'IBM Personal Communications I-Series Access WorkStation 5.9 Profile',
'Description' => %q{ 'Description' => %q{
The IBM Personal Communications I-Series application WorkStation is susceptible to a The IBM Personal Communications I-Series application WorkStation is susceptible to a
stack-based buffer overflow vulnerability within file parsing in which data copied to a stack-based buffer overflow vulnerability within file parsing in which data copied to a
location in memory exceeds the size of the reserved destination area. The buffer is located location in memory exceeds the size of the reserved destination area. The buffer is located
on the runtime program stack. on the runtime program stack.

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{ 'Description' => %q{
This module exploits a vulnerability found in Sysax's SSH service. By This module exploits a vulnerability found in Sysax's SSH service. By
supplying a long username, the SSH server will copy that data on the stack supplying a long username, the SSH server will copy that data on the stack
without any proper bounds checking, therefore allowing remote code execution without proper bounds checking, therefore allowing remote code execution
under the context of the user. Please note that previous versions under the context of the user. Please note that previous versions
(before 5.53) are also affected by this bug. (before 5.53) are also affected by this bug.
}, },