diff --git a/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb b/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb index 2fc3ea16d2..47a803a44b 100644 --- a/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb +++ b/modules/exploits/windows/ftp/ftpgetter_pwd_reply.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client. When processing the response on a PWD command, a stack based buffer overflow occurs. - This leads to arbitrary code execution when a structured exception handler gets + This leads to arbitrary code execution when a structured exception handler gets overwritten. }, 'Author' => diff --git a/modules/exploits/windows/ftp/ftppad_list_reply.rb b/modules/exploits/windows/ftp/ftppad_list_reply.rb index 84ebc469fe..838d3ae83c 100644 --- a/modules/exploits/windows/ftp/ftppad_list_reply.rb +++ b/modules/exploits/windows/ftp/ftppad_list_reply.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote triggered when the client connects to a FTP server which sends an overly long directory and filename in response to a LIST command. - This will cause an access violation, and will eventually overwrite the saved extended + This will cause an access violation, and will eventually overwrite the saved extended instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/ sniper was needed to make this one work. }, diff --git a/modules/exploits/windows/ftp/ftpsynch_list_reply.rb b/modules/exploits/windows/ftp/ftpsynch_list_reply.rb index 6ae2e4cdaa..b18a3d169b 100644 --- a/modules/exploits/windows/ftp/ftpsynch_list_reply.rb +++ b/modules/exploits/windows/ftp/ftpsynch_list_reply.rb @@ -17,8 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'FTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow', 'Description' => %q{ - This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro - version 4.0.73.274 The overflow gets triggered by sending an overly long filename to + This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro + version 4.0.73.274 The overflow gets triggered by sending an overly long filename to the client in response to a LIST command. The LIST command gets issued when doing a preview or when you have just created a new sync profile and allow the tool to see the differences. diff --git a/modules/exploits/windows/ftp/seagull_list_reply.rb b/modules/exploits/windows/ftp/seagull_list_reply.rb index 8eacb631b4..3d3affe097 100644 --- a/modules/exploits/windows/ftp/seagull_list_reply.rb +++ b/modules/exploits/windows/ftp/seagull_list_reply.rb @@ -18,9 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Seagull FTP v3.3 build 409 Stack Buffer Overflow', 'Description' => %q{ - This module exploits a buffer overflow in the Seagull FTP client that gets + This module exploits a buffer overflow in the Seagull FTP client that gets triggered when the ftp clients processes a response to a LIST command. If the - response contains an overly long file/folder name, a buffer overflow occurs, + response contains an overly long file/folder name, a buffer overflow occurs, overwriting a structured exception handler. }, 'Author' =>