oops, messed up whitespace

git-svn-id: file:///home/svn/framework3/trunk@10661 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-10-12 18:40:13 +00:00
parent e0e4aebcc1
commit b11fbb67eb
4 changed files with 6 additions and 6 deletions

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{ 'Description' => %q{
This module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client. This module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client.
When processing the response on a PWD command, a stack based buffer overflow occurs. When processing the response on a PWD command, a stack based buffer overflow occurs.
This leads to arbitrary code execution when a structured exception handler gets This leads to arbitrary code execution when a structured exception handler gets
overwritten. overwritten.
}, },
'Author' => 'Author' =>

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
triggered when the client connects to a FTP server which sends an overly long directory triggered when the client connects to a FTP server which sends an overly long directory
and filename in response to a LIST command. and filename in response to a LIST command.
This will cause an access violation, and will eventually overwrite the saved extended This will cause an access violation, and will eventually overwrite the saved extended
instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/ instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/
sniper was needed to make this one work. sniper was needed to make this one work.
}, },

View File

@ -17,8 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => 'FTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow', 'Name' => 'FTP Synchronizer Professional 4.0.73.274 Stack Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro This module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro
version 4.0.73.274 The overflow gets triggered by sending an overly long filename to version 4.0.73.274 The overflow gets triggered by sending an overly long filename to
the client in response to a LIST command. the client in response to a LIST command.
The LIST command gets issued when doing a preview or when you have just created a new The LIST command gets issued when doing a preview or when you have just created a new
sync profile and allow the tool to see the differences. sync profile and allow the tool to see the differences.

View File

@ -18,9 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => 'Seagull FTP v3.3 build 409 Stack Buffer Overflow', 'Name' => 'Seagull FTP v3.3 build 409 Stack Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a buffer overflow in the Seagull FTP client that gets This module exploits a buffer overflow in the Seagull FTP client that gets
triggered when the ftp clients processes a response to a LIST command. If the triggered when the ftp clients processes a response to a LIST command. If the
response contains an overly long file/folder name, a buffer overflow occurs, response contains an overly long file/folder name, a buffer overflow occurs,
overwriting a structured exception handler. overwriting a structured exception handler.
}, },
'Author' => 'Author' =>