Minor changes

bug/bundler_fix
sinn3r 2013-02-19 11:40:06 -06:00
parent 553d7abe43
commit 9813c815ef
1 changed files with 4 additions and 4 deletions

View File

@ -14,15 +14,15 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'BigAnt Server SCH And DUPF Buffer Overflow',
'Name' => 'BigAnt Server 2 SCH And DUPF Buffer Overflow',
'Description' => %q{
This exploits a stack buffer overflow in the BigAnt Server 2.97 SP7. The
This exploits a stack buffer overflow in BigAnt Server 2.97 SP7. The
vulnerability is due to the dangerous usage of strcpy while handling errors. This
module uses a combination of SCH and DUPF request to trigger the vulnerability and
module uses a combination of SCH and DUPF request to trigger the vulnerability, and
has been tested successfully against version 2.97 SP7 over Windows XP SP3 and
Windows 2003 SP2.
},
'Author' =>
'Author' =>
[
'Hamburgers Maccoy', # Vulnerability discovery
'juan vazquez' # Metasploit module