Correct e-mail format, description, and some commas.

unstable
sinn3r 2012-06-18 18:52:26 -05:00
parent 4a537675b5
commit 4987acc703
1 changed files with 6 additions and 6 deletions

View File

@ -19,28 +19,28 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'EZHomeTech EzServer <= 6.4.017 Stack Buffer Overflow Vulnerability',
'Description' => %q{
This module exploits a stack buffer overflow in the EZHomeTech EZServer. If a malicious
user sends packets containing an overly long string, it may be possible to execute a
payload remotely. Due to size constraints, this module uses the Egghunter technique.
user sends packets containing an overly long string, it may be possible to execute a
payload remotely. Due to size constraints, this module uses the Egghunter technique.
},
'License' => MSF_LICENSE,
'Author' =>
[
'modpr0be<modpr0be@spentera.com>', # Original discovery and Metasploit module
'modpr0be<modpr0be[at]spentera.com>' # Original discovery and Metasploit module
],
'References' =>
[
[ 'EDB', '19266' ],
[ 'URL', 'http://www.spentera.com/2012/06/ezhometech-ezserver-6-4-017-stack-overflow-vulnerability/' ],
[ 'URL', 'http://www.spentera.com/2012/06/ezhometech-ezserver-6-4-017-stack-overflow-vulnerability/' ]
],
'DefaultOptions' =>
{
'ExitFunction' => 'seh',
'ExitFunction' => 'seh'
},
'Platform' => 'win',
'Payload' =>
{
'BadChars' => "\x00\x0a\x0d\x20\x2e\x2f\x3a",
'DisableNops' => true,
'DisableNops' => true
},
'Targets' =>
[