Minor changes
parent
553d7abe43
commit
9813c815ef
|
@ -14,15 +14,15 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'BigAnt Server SCH And DUPF Buffer Overflow',
|
||||
'Name' => 'BigAnt Server 2 SCH And DUPF Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This exploits a stack buffer overflow in the BigAnt Server 2.97 SP7. The
|
||||
This exploits a stack buffer overflow in BigAnt Server 2.97 SP7. The
|
||||
vulnerability is due to the dangerous usage of strcpy while handling errors. This
|
||||
module uses a combination of SCH and DUPF request to trigger the vulnerability and
|
||||
module uses a combination of SCH and DUPF request to trigger the vulnerability, and
|
||||
has been tested successfully against version 2.97 SP7 over Windows XP SP3 and
|
||||
Windows 2003 SP2.
|
||||
},
|
||||
'Author' =>
|
||||
'Author' =>
|
||||
[
|
||||
'Hamburgers Maccoy', # Vulnerability discovery
|
||||
'juan vazquez' # Metasploit module
|
||||
|
|
Loading…
Reference in New Issue