add description, versions, fix whitespace
git-svn-id: file:///home/svn/framework3/trunk@9167 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
b2f338984b
commit
4f364e2830
|
@ -9,10 +9,8 @@
|
||||||
# http://metasploit.com/framework/
|
# http://metasploit.com/framework/
|
||||||
##
|
##
|
||||||
|
|
||||||
|
|
||||||
require 'msf/core'
|
require 'msf/core'
|
||||||
|
|
||||||
|
|
||||||
class Metasploit3 < Msf::Exploit::Remote
|
class Metasploit3 < Msf::Exploit::Remote
|
||||||
Rank = AverageRanking
|
Rank = AverageRanking
|
||||||
|
|
||||||
|
@ -20,9 +18,15 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Samba nttrans Overflow',
|
'Name' => 'Samba 2.2.2 - 2.2.6 nttrans Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
|
This module attempts to exploit a buffer overflow vulnerability present in
|
||||||
|
versions 2.2.2 through 2.2.6 of Samba.
|
||||||
|
|
||||||
|
The Samba developers report this as:
|
||||||
|
"Bug in the length checking for encrypted password change requests from clients."
|
||||||
|
|
||||||
|
The bug was discovered and reported by the Debian Samba Maintainers.
|
||||||
},
|
},
|
||||||
'Author' => [ 'hdm' ],
|
'Author' => [ 'hdm' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
@ -32,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
[ 'CVE', '2003-0085' ],
|
[ 'CVE', '2003-0085' ],
|
||||||
[ 'OSVDB', '6323' ],
|
[ 'OSVDB', '6323' ],
|
||||||
[ 'BID', '7106' ],
|
[ 'BID', '7106' ],
|
||||||
|
[ 'URL', 'http://www.samba.org/samba/history/samba-2.2.7a.html' ]
|
||||||
],
|
],
|
||||||
'Privileged' => true,
|
'Privileged' => true,
|
||||||
'Payload' =>
|
'Payload' =>
|
||||||
|
@ -57,7 +62,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
[
|
[
|
||||||
Opt::RPORT(139)
|
Opt::RPORT(139)
|
||||||
], self.class)
|
], self.class)
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
|
@ -71,7 +75,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
# 0x081b8138
|
# 0x081b8138
|
||||||
|
|
||||||
|
|
||||||
connect
|
connect
|
||||||
smb_login
|
smb_login
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue