oops, messed up whitespace

git-svn-id: file:///home/svn/framework3/trunk@10661 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-10-12 18:40:13 +00:00
parent e0e4aebcc1
commit b11fbb67eb
4 changed files with 6 additions and 6 deletions

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client.
When processing the response on a PWD command, a stack based buffer overflow occurs.
This leads to arbitrary code execution when a structured exception handler gets
This leads to arbitrary code execution when a structured exception handler gets
overwritten.
},
'Author' =>

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
triggered when the client connects to a FTP server which sends an overly long directory
and filename in response to a LIST command.
This will cause an access violation, and will eventually overwrite the saved extended
This will cause an access violation, and will eventually overwrite the saved extended
instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/
sniper was needed to make this one work.
},

View File

@ -17,8 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'FTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro
version 4.0.73.274 The overflow gets triggered by sending an overly long filename to
This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro
version 4.0.73.274 The overflow gets triggered by sending an overly long filename to
the client in response to a LIST command.
The LIST command gets issued when doing a preview or when you have just created a new
sync profile and allow the tool to see the differences.

View File

@ -18,9 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Seagull FTP v3.3 build 409 Stack Buffer Overflow',
'Description' => %q{
This module exploits a buffer overflow in the Seagull FTP client that gets
This module exploits a buffer overflow in the Seagull FTP client that gets
triggered when the ftp clients processes a response to a LIST command. If the
response contains an overly long file/folder name, a buffer overflow occurs,
response contains an overly long file/folder name, a buffer overflow occurs,
overwriting a structured exception handler.
},
'Author' =>