oops, messed up whitespace
git-svn-id: file:///home/svn/framework3/trunk@10661 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
e0e4aebcc1
commit
b11fbb67eb
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client.
|
This module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client.
|
||||||
When processing the response on a PWD command, a stack based buffer overflow occurs.
|
When processing the response on a PWD command, a stack based buffer overflow occurs.
|
||||||
This leads to arbitrary code execution when a structured exception handler gets
|
This leads to arbitrary code execution when a structured exception handler gets
|
||||||
overwritten.
|
overwritten.
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
triggered when the client connects to a FTP server which sends an overly long directory
|
triggered when the client connects to a FTP server which sends an overly long directory
|
||||||
and filename in response to a LIST command.
|
and filename in response to a LIST command.
|
||||||
|
|
||||||
This will cause an access violation, and will eventually overwrite the saved extended
|
This will cause an access violation, and will eventually overwrite the saved extended
|
||||||
instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/
|
instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/
|
||||||
sniper was needed to make this one work.
|
sniper was needed to make this one work.
|
||||||
},
|
},
|
||||||
|
|
|
@ -17,8 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'FTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow',
|
'Name' => 'FTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro
|
This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro
|
||||||
version 4.0.73.274 The overflow gets triggered by sending an overly long filename to
|
version 4.0.73.274 The overflow gets triggered by sending an overly long filename to
|
||||||
the client in response to a LIST command.
|
the client in response to a LIST command.
|
||||||
The LIST command gets issued when doing a preview or when you have just created a new
|
The LIST command gets issued when doing a preview or when you have just created a new
|
||||||
sync profile and allow the tool to see the differences.
|
sync profile and allow the tool to see the differences.
|
||||||
|
|
|
@ -18,9 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Seagull FTP v3.3 build 409 Stack Buffer Overflow',
|
'Name' => 'Seagull FTP v3.3 build 409 Stack Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a buffer overflow in the Seagull FTP client that gets
|
This module exploits a buffer overflow in the Seagull FTP client that gets
|
||||||
triggered when the ftp clients processes a response to a LIST command. If the
|
triggered when the ftp clients processes a response to a LIST command. If the
|
||||||
response contains an overly long file/folder name, a buffer overflow occurs,
|
response contains an overly long file/folder name, a buffer overflow occurs,
|
||||||
overwriting a structured exception handler.
|
overwriting a structured exception handler.
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
Loading…
Reference in New Issue