Consistency changes for exploit titles and additional references

git-svn-id: file:///home/svn/framework3/trunk@3878 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2006-09-13 06:49:39 +00:00
parent c62905f475
commit 41c81a1e12
13 changed files with 22 additions and 15 deletions

View File

@ -8,7 +8,7 @@ class Exploits::Windows::Dcerpc::MS03_026_DCOM < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft RPC DCOM MSO3-026',
'Name' => 'Microsoft RPC DCOM Interface Overflow',
'Description' => %q{
This module exploits a stack overflow in the RPCSS service, this vulnerability
was originally found by the Last Stage of Delirium research group and has bee
@ -22,6 +22,8 @@ class Exploits::Windows::Dcerpc::MS03_026_DCOM < Msf::Exploit::Remote
[
[ 'OSVDB', '2100' ],
[ 'MSB', 'MS03-026' ],
[ 'BID', '8205' ],
[ 'CVE', '2003-0352' ],
],
'Privileged' => true,
'DefaultOptions' =>

View File

@ -9,7 +9,7 @@ class Exploits::Windows::Dcerpc::MS05_017_MSMQ < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Message Queueing Service MSO5-017',
'Name' => 'Microsoft Message Queueing Service Path Overflow',
'Description' => %q{
This module exploits a stack overflow in the RPC interface
to the Microsoft Message Queueing service. The offset to the
@ -28,6 +28,7 @@ class Exploits::Windows::Dcerpc::MS05_017_MSMQ < Msf::Exploit::Remote
[ 'CVE', '2005-0059'],
[ 'MSB', 'MS05-017'],
[ 'MIL', '41'],
[ 'BID', '13112'],
],
'Privileged' => true,

View File

@ -8,7 +8,7 @@ class Exploits::Windows::Mssql::MS02_039_ResOverflow < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'MSSQL 2000/MSDE Resolution Overflow',
'Name' => 'Microsoft SQL Server Resolution Overflow',
'Description' => %q{
This is an exploit for the SQL Server 2000 resolution
service buffer overflow. This overflow is triggered by

View File

@ -8,7 +8,7 @@ class Exploits::Windows::Mssql::MS02_056_HelloOverflow < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'MSSQL 2000/MSDE Hello Buffer Overflow',
'Name' => 'Microsoft SQL Server Hello Overflow',
'Description' => %q{
By sending malformed data to TCP port 1433, an
unauthenticated remote attacker could overflow a buffer and

View File

@ -10,7 +10,7 @@ class Exploits::Windows::Smb::MS03_049_NETAPI < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft NetAddAlternateComputerName MS03-049 Overflow',
'Name' => 'Microsoft Workstation Service NetAddAlternateComputerName Overflow',
'Description' => %q{
This module exploits a stack overflow in the NetApi32 NetAddAlternateComputerName
function using the Workstation service in Windows XP.

View File

@ -14,7 +14,7 @@ class Exploits::Windows::Smb::MS04_011_LSASS < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft LSASS MSO4-011 Overflow',
'Name' => 'Microsoft LSASS Service DsRolerUpgradeDownlevelServer Overflow',
'Description' => %q{
This module exploits a stack overflow in the LSASS service, this vulnerability
was originally found by eEye. When re-exploiting a Windows XP system, you will need
@ -26,6 +26,8 @@ class Exploits::Windows::Smb::MS04_011_LSASS < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '10108' ],
[ 'CVE', '2003-0533' ],
[ 'OSVDB', '5248' ],
[ 'MSB', 'MS04-011' ],
[ 'MIL', '36' ],

View File

@ -9,7 +9,7 @@ class Exploits::Windows::Smb::MS04_039_NETDDE < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft Network Dynamic Data Exchange Server MS04-031',
'Name' => 'Microsoft NetDDE Service Overflow',
'Description' => %q{
This module exploits a stack overflow in the NetDDE service, which is the
precursor to the DCOM interface. This exploit effects only operating systems

View File

@ -10,7 +10,7 @@ class Exploits::Windows::Smb::MS05_039_PNP < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft PnP MS05-039 Overflow',
'Name' => 'Microsoft Plug and Play Service Overflow',
'Description' => %q{
This module exploits a stack overflow in the Windows Plug
and Play service. This vulnerability can be exploited on

View File

@ -10,7 +10,7 @@ class Exploits::Windows::Smb::MS06_025_RASMANS_REG < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft RASMAN Registry MS06-025 Overflow',
'Name' => 'Microsoft RRAS Service RASMAN Registry Overflow',
'Description' => %q{
This module exploits a registry-based stack overflow in the Windows Routing
and Remote Access Service. Since the service is hosted inside svchost.exe,

View File

@ -10,7 +10,7 @@ class Exploits::Windows::Smb::MS06_025_RRAS < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft RRAS MS06-025 Overflow',
'Name' => 'Microsoft RRAS Service Overflow',
'Description' => %q{
This module exploits a stack overflow in the Windows Routing and Remote
Access Service. Since the service is hosted inside svchost.exe, a failed

View File

@ -10,7 +10,7 @@ class Exploits::Windows::Smb::MS06_040_NETAPI < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft NetpwPathCanonicalize MS06-040 Overflow',
'Name' => 'Microsoft Server Service NetpwPathCanonicalize Overflow',
'Description' => %q{
This module exploits a stack overflow in the NetApi32 CanonicalizePathName() function
using the NetpwPathCanonicalize RPC call in the Server Service. It is likely that

View File

@ -8,7 +8,7 @@ class Exploits::Windows::Ssl::MS04_011_PCT < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft SSL PCT MS04-011 Overflow',
'Name' => 'Microsoft Private Communications Transport Overflow',
'Description' => %q{
This module exploits a buffer overflow in the Microsoft
Windows SSL PCT protocol stack. This code is based on Johnny
@ -25,11 +25,13 @@ class Exploits::Windows::Ssl::MS04_011_PCT < Msf::Exploit::Remote
crash of the remote system.
},
'Author' => [ 'hdm', 'Johnny Cyberpunk <jcyberpunk@thc.org>' ],
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '10116'],
[ 'CVE', '2003-0719'],
[ 'OSVDB', '5250'],
[ 'MSB', 'MS04-011'],
[ 'MIL', '77'],
@ -114,7 +116,7 @@ class Exploits::Windows::Ssl::MS04_011_PCT < Msf::Exploit::Remote
# This is a heap ptr to the ssl request
# ... and just happens to not die ...
# Thanks to Core ST, Halvar, JohnnyC :)
# Thanks to CORE and Halvar
#
# 80620101 => and byte ptr [esi+1], 0x2
# bd00010001 => mov ebp, 0x1000100

View File

@ -8,7 +8,7 @@ class Exploits::Windows::Wins::MS04_045 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Microsoft WINS MS04-045 Code Execution',
'Name' => 'Microsoft WINS Service Memory Overwrite',
'Description' => %q{
This module exploits a arbitrary memory write flaw in the
WINS service. This exploit has been tested against Windows