git-svn-id: file:///home/svn/framework3/trunk@11125 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Mario Ceballos 2010-11-24 13:44:46 +00:00
parent 0d5c85b67a
commit 8c46a6be51
1 changed files with 2 additions and 3 deletions

View File

@ -18,21 +18,20 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'DATAC RealWin SCADA Server Buffer Overflow', 'Name' => 'DATAC RealWin SCADA Server SCPC_TXTEVENT Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack buffer overflow in DATAC Control This module exploits a stack buffer overflow in DATAC Control
International RealWin SCADA Server 2.0 (Build 6.1.8.10). International RealWin SCADA Server 2.0 (Build 6.1.8.10).
By sending a specially crafted packet, By sending a specially crafted packet,
an attacker may be able to execute arbitrary code. an attacker may be able to execute arbitrary code.
}, },
'Author' => [ 'MC' ], 'Author' => [ 'Luigi Auriemma', 'MC' ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Version' => '$Revision$', 'Version' => '$Revision$',
'References' => 'References' =>
[ [
[ 'CVE', '2010-4142'], [ 'CVE', '2010-4142'],
[ 'OSVDB', '68812'], [ 'OSVDB', '68812'],
[ 'URL', 'http://www.metasploit.com/users/mc' ],
], ],
'Privileged' => true, 'Privileged' => true,
'DefaultOptions' => 'DefaultOptions' =>