diff --git a/modules/exploits/linux/misc/ueb9_bpserverd.rb b/modules/exploits/linux/misc/ueb9_bpserverd.rb index bafbebe26a..963ba47dff 100644 --- a/modules/exploits/linux/misc/ueb9_bpserverd.rb +++ b/modules/exploits/linux/misc/ueb9_bpserverd.rb @@ -56,7 +56,7 @@ class MetasploitModule < Msf::Exploit::Remote buf1 = s1.get_once(-1).to_s #parse out the bpd port returned bpd_port = buf1[-8..-3].to_i - + #check if it's a valid port number (1-65534) if bpd_port && bpd_port >= 1 && bpd_port <= 65535 Exploit::CheckCode::Detected