oops, messed up whitespace
git-svn-id: file:///home/svn/framework3/trunk@10661 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
e0e4aebcc1
commit
b11fbb67eb
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client.
|
||||
When processing the response on a PWD command, a stack based buffer overflow occurs.
|
||||
This leads to arbitrary code execution when a structured exception handler gets
|
||||
This leads to arbitrary code execution when a structured exception handler gets
|
||||
overwritten.
|
||||
},
|
||||
'Author' =>
|
||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
triggered when the client connects to a FTP server which sends an overly long directory
|
||||
and filename in response to a LIST command.
|
||||
|
||||
This will cause an access violation, and will eventually overwrite the saved extended
|
||||
This will cause an access violation, and will eventually overwrite the saved extended
|
||||
instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/
|
||||
sniper was needed to make this one work.
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'FTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro
|
||||
version 4.0.73.274 The overflow gets triggered by sending an overly long filename to
|
||||
This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro
|
||||
version 4.0.73.274 The overflow gets triggered by sending an overly long filename to
|
||||
the client in response to a LIST command.
|
||||
The LIST command gets issued when doing a preview or when you have just created a new
|
||||
sync profile and allow the tool to see the differences.
|
||||
|
|
|
@ -18,9 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Seagull FTP v3.3 build 409 Stack Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a buffer overflow in the Seagull FTP client that gets
|
||||
This module exploits a buffer overflow in the Seagull FTP client that gets
|
||||
triggered when the ftp clients processes a response to a LIST command. If the
|
||||
response contains an overly long file/folder name, a buffer overflow occurs,
|
||||
response contains an overly long file/folder name, a buffer overflow occurs,
|
||||
overwriting a structured exception handler.
|
||||
},
|
||||
'Author' =>
|
||||
|
|
Loading…
Reference in New Issue