Correct typo and set the disclosure date
parent
7b692aa0b9
commit
8315709fb6
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'FreeBSD Telnet Service Encyption Key ID Buffer Overflow',
|
||||
'Name' => 'FreeBSD Telnet Service Encryption Key ID Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a buffer overflow in the encryption option handler of the
|
||||
FreeBSD telnet service.
|
||||
|
@ -58,8 +58,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'FreeBSD 5.3', { 'Ret' => 0x8059730 } ], # direct return
|
||||
# Versions 5.2 and below do not support encyption
|
||||
],
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => ''))
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'Dec 23 2011'))
|
||||
end
|
||||
|
||||
def exploit_target(t)
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Linux BSD-derived Telnet Service Encyption Key ID Buffer Overflow',
|
||||
'Name' => 'Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a buffer overflow in the encryption option handler of the
|
||||
Linux BSD-derived telnet service (inetutils or krb5-telnet). Most Linux distributions
|
||||
|
@ -51,8 +51,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Automatic', { } ],
|
||||
[ 'Red Hat Enterprise Linux 3 (krb5-telnet)', { 'Ret' => 0x0804b43c } ],
|
||||
],
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => ''))
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'Dec 23 2011'))
|
||||
end
|
||||
|
||||
def exploit_target(t)
|
||||
|
|
Loading…
Reference in New Issue