Spelling is hard

bug/bundler_fix
Chris Higgins 2017-03-14 23:34:00 -05:00
parent cc4f18e6c5
commit b3fbbbee34
2 changed files with 5 additions and 3 deletions

View File

@ -2,7 +2,7 @@
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
via its SMTP server validation. The module sends a malicious response along in the
220 service ready response and exploits the client resulting in an unpriviledged shell.
220 service ready response and exploits the client resulting in an unprivileged shell.
## Verification Steps

View File

@ -1,4 +1,4 @@
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
#
@ -13,13 +13,15 @@ require 'msf/core'
class MetasploitModule < Msf::Exploit::Remote
include Msf::Exploit::Remote::TcpServer
Rank = NormalRanking
def initialize()
super(
'Name' => 'SysGauge SMTP Validation Buffer Overflow',
'Description' => %q{
This module will setup a SMTP server expecting a connection from SysGauge 1.5.18
via its SMTP server validation. The module sends a malicious response along in the
220 service ready response and exploits the client resulting in an unpriviledged shell.
220 service ready response and exploits the client resulting in an unprivileged shell.
},
'Author' =>
[