Spelling is hard
parent
cc4f18e6c5
commit
b3fbbbee34
|
@ -2,7 +2,7 @@
|
|||
|
||||
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
|
||||
via its SMTP server validation. The module sends a malicious response along in the
|
||||
220 service ready response and exploits the client resulting in an unpriviledged shell.
|
||||
220 service ready response and exploits the client resulting in an unprivileged shell.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
##
|
||||
|
||||
# This module requires Metasploit: http://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
#
|
||||
|
@ -13,13 +13,15 @@ require 'msf/core'
|
|||
class MetasploitModule < Msf::Exploit::Remote
|
||||
include Msf::Exploit::Remote::TcpServer
|
||||
|
||||
Rank = NormalRanking
|
||||
|
||||
def initialize()
|
||||
super(
|
||||
'Name' => 'SysGauge SMTP Validation Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
|
||||
via its SMTP server validation. The module sends a malicious response along in the
|
||||
220 service ready response and exploits the client resulting in an unpriviledged shell.
|
||||
220 service ready response and exploits the client resulting in an unprivileged shell.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue