Correct e-mail format, description, and some commas.
parent
4a537675b5
commit
4987acc703
|
@ -19,28 +19,28 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'EZHomeTech EzServer <= 6.4.017 Stack Buffer Overflow Vulnerability',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in the EZHomeTech EZServer. If a malicious
|
||||
user sends packets containing an overly long string, it may be possible to execute a
|
||||
payload remotely. Due to size constraints, this module uses the Egghunter technique.
|
||||
user sends packets containing an overly long string, it may be possible to execute a
|
||||
payload remotely. Due to size constraints, this module uses the Egghunter technique.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'modpr0be<modpr0be@spentera.com>', # Original discovery and Metasploit module
|
||||
'modpr0be<modpr0be[at]spentera.com>' # Original discovery and Metasploit module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'EDB', '19266' ],
|
||||
[ 'URL', 'http://www.spentera.com/2012/06/ezhometech-ezserver-6-4-017-stack-overflow-vulnerability/' ],
|
||||
[ 'URL', 'http://www.spentera.com/2012/06/ezhometech-ezserver-6-4-017-stack-overflow-vulnerability/' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
'ExitFunction' => 'seh',
|
||||
'ExitFunction' => 'seh'
|
||||
},
|
||||
'Platform' => 'win',
|
||||
'Payload' =>
|
||||
{
|
||||
'BadChars' => "\x00\x0a\x0d\x20\x2e\x2f\x3a",
|
||||
'DisableNops' => true,
|
||||
'DisableNops' => true
|
||||
},
|
||||
'Targets' =>
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue