style compliance fixes

git-svn-id: file:///home/svn/framework3/trunk@11275 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-12-10 19:50:16 +00:00
parent 9f5df90e60
commit 5cc8407748
1 changed files with 6 additions and 6 deletions

View File

@ -24,13 +24,13 @@ class Metasploit3 < Msf::Exploit::Remote
version 4.69. By sending a specially crafted message, an attacker can corrupt the
heap and execute arbitrary code with the privileges of the Exim daemon.
The root cause is that no check is made to ensure that the buffer is not full
The root cause is that no check is made to ensure that the buffer is not full
prior to handling '%s' format specifiers within the 'string_vformat' function.
In order to trigger this issue, we get our message rejected by sending a message
that is too large. This will call into log_write to log rejection headers (which
that is too large. This will call into log_write to log rejection headers (which
is a default configuration setting). After filling the buffer, a long header
string is sent. In a successful attempt, it overwrites the ACL for the 'MAIL
FROM' command. By sending a second message, the string we sent will be evaluated
string is sent. In a successful attempt, it overwrites the ACL for the 'MAIL
FROM' command. By sending a second message, the string we sent will be evaluated
with 'expand_string' and arbitrary shell commands can be executed.
It is likely that this issue could also be exploited using other techniques such
@ -41,7 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
This bug was original found and reported in December 2008, but was not
properly handled as a security issue. Therefore, there was a 2 year lag time
between when the issue was fixed and when it was discovered being exploited
in the wild. At that point, the issue was assigned a CVE and began being
in the wild. At that point, the issue was assigned a CVE and began being
addressed by downstream vendors.
An additional vulnerability, CVE-2010-4345, was also used in the attack that
@ -165,7 +165,7 @@ class Metasploit3 < Msf::Exploit::Remote
# Should be: "sh-x.x$ " !!
print_status("MAIL result: #{buf.inspect}") if buf
buf = raw_send_recv("RCPT TO: #{datastore['MAILTO']}\r\n")
buf = raw_send_recv("RCPT TO: #{datastore['MAILTO']}\r\n")
# Should be: "sh: RCPT: command not found\n"
print_status("RCPT result: #{buf.inspect}") if buf