style compliance fixes
git-svn-id: file:///home/svn/framework3/trunk@11275 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
9f5df90e60
commit
5cc8407748
|
@ -24,13 +24,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
version 4.69. By sending a specially crafted message, an attacker can corrupt the
|
||||
heap and execute arbitrary code with the privileges of the Exim daemon.
|
||||
|
||||
The root cause is that no check is made to ensure that the buffer is not full
|
||||
The root cause is that no check is made to ensure that the buffer is not full
|
||||
prior to handling '%s' format specifiers within the 'string_vformat' function.
|
||||
In order to trigger this issue, we get our message rejected by sending a message
|
||||
that is too large. This will call into log_write to log rejection headers (which
|
||||
that is too large. This will call into log_write to log rejection headers (which
|
||||
is a default configuration setting). After filling the buffer, a long header
|
||||
string is sent. In a successful attempt, it overwrites the ACL for the 'MAIL
|
||||
FROM' command. By sending a second message, the string we sent will be evaluated
|
||||
string is sent. In a successful attempt, it overwrites the ACL for the 'MAIL
|
||||
FROM' command. By sending a second message, the string we sent will be evaluated
|
||||
with 'expand_string' and arbitrary shell commands can be executed.
|
||||
|
||||
It is likely that this issue could also be exploited using other techniques such
|
||||
|
@ -41,7 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
This bug was original found and reported in December 2008, but was not
|
||||
properly handled as a security issue. Therefore, there was a 2 year lag time
|
||||
between when the issue was fixed and when it was discovered being exploited
|
||||
in the wild. At that point, the issue was assigned a CVE and began being
|
||||
in the wild. At that point, the issue was assigned a CVE and began being
|
||||
addressed by downstream vendors.
|
||||
|
||||
An additional vulnerability, CVE-2010-4345, was also used in the attack that
|
||||
|
@ -165,7 +165,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# Should be: "sh-x.x$ " !!
|
||||
print_status("MAIL result: #{buf.inspect}") if buf
|
||||
|
||||
buf = raw_send_recv("RCPT TO: #{datastore['MAILTO']}\r\n")
|
||||
buf = raw_send_recv("RCPT TO: #{datastore['MAILTO']}\r\n")
|
||||
# Should be: "sh: RCPT: command not found\n"
|
||||
print_status("RCPT result: #{buf.inspect}") if buf
|
||||
|
||||
|
|
Loading…
Reference in New Issue