From 4dc88cf60fac7bb92cdf49339c51a9abd06bd061 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Mon, 30 Sep 2013 13:30:31 -0500 Subject: [PATCH] Expand descriptions for ease of use. --- modules/exploits/windows/ftp/freeftpd_pass.rb | 3 +-- modules/post/windows/gather/resolve_hosts.rb | 2 +- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/ftp/freeftpd_pass.rb b/modules/exploits/windows/ftp/freeftpd_pass.rb index 5adca83102..3915f9ab66 100644 --- a/modules/exploits/windows/ftp/freeftpd_pass.rb +++ b/modules/exploits/windows/ftp/freeftpd_pass.rb @@ -19,8 +19,7 @@ class Metasploit3 < Msf::Exploit::Remote freeFTPd 1.0.10 and below contains an overflow condition that is triggered as user-supplied input is not properly validated when handling a specially crafted PASS command. This may allow a remote attacker to cause a buffer overflow, - resulting in a denial of service or potentially allowing the execution of - arbitrary code. + resulting in a denial of service or allow the execution of arbitrary code. FreeFTPd must have an account set to authorization anonymous user account. }, diff --git a/modules/post/windows/gather/resolve_hosts.rb b/modules/post/windows/gather/resolve_hosts.rb index 7d30a34469..55c2cda5e4 100644 --- a/modules/post/windows/gather/resolve_hosts.rb +++ b/modules/post/windows/gather/resolve_hosts.rb @@ -14,7 +14,7 @@ class Metasploit3 < Msf::Post super( update_info( info, 'Name' => 'Windows Resolve Hosts', 'Description' => %q{ - Resolves hostnames to either IPv4 or IPv6 addresses. + Resolves hostnames to either IPv4 or IPv6 addresses from the perspective of the remote host. }, 'License' => MSF_LICENSE, 'Author' => [ 'Ben Campbell ' ],