add description, references, etc
git-svn-id: file:///home/svn/framework3/trunk@11515 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
08f3f44f98
commit
af79f5c0ea
|
@ -20,18 +20,23 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Mac OS X mDNSResponder UPnP Location Overflow',
|
||||
'Description' => %q{
|
||||
TODO
|
||||
This module exploits a buffer overflow that occurs when processing
|
||||
specially crafted requests set to mDNSResponder. All Mac OS X systems
|
||||
between version 10.4 and 10.4.9 (without the 2007-005 patch) are
|
||||
affected.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'TBD'
|
||||
'ddz'
|
||||
],
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
# possibly c-v-e--2-0-0-7--3-7-4-4
|
||||
# or c-v-e--2-0-0-7--2-3-8-6
|
||||
[ 'OSVDB', '35142' ],
|
||||
[ 'CVE', '2007-2386' ],
|
||||
[ 'BID', '24144' ],
|
||||
[ 'URL', 'http://support.apple.com/kb/TA24732' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
@ -65,6 +70,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
}
|
||||
]
|
||||
],
|
||||
'DisclosureDate' => 'May 25 2007',
|
||||
'DefaultTarget' => 1))
|
||||
|
||||
register_options(
|
||||
|
|
Loading…
Reference in New Issue