64-bit, not '64 bits'
parent
e71e0c1c28
commit
e3384439ed
|
@ -19,8 +19,8 @@ class Metasploit4 < Msf::Auxiliary
|
|||
The AES-NI implementation of OpenSSL 1.0.1c does not properly compute the
|
||||
length of an encrypted message when used with a TLS version 1.1 or above. This
|
||||
leads to an integer underflow which can cause a DoS. The vulnerable function
|
||||
aesni_cbc_hmac_sha1_cipher is only included in the 64 bits versions of OpenSSL.
|
||||
This module has been tested successfully on Ubuntu 12.04 (64 bits) with the default
|
||||
aesni_cbc_hmac_sha1_cipher is only included in the 64-bit versions of OpenSSL.
|
||||
This module has been tested successfully on Ubuntu 12.04 (64-bit) with the default
|
||||
OpenSSL 1.0.1c package.
|
||||
},
|
||||
'Author' =>
|
||||
|
|
|
@ -39,7 +39,7 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
This module abuses the SAP NetWeaver SXPG_CALL_SYSTEM function, on the SAP SOAP
|
||||
RFC Service, to execute remote commands. This module needs SAP credentials with
|
||||
privileges to use the /sap/bc/soap/rfc in order to work. The module has been tested
|
||||
successfully on Windows 2008 64 bits and Linux 64 bits platforms.
|
||||
successfully on Windows 2008 64-bit and Linux 64-bit platforms.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
|
|
|
@ -39,7 +39,7 @@ class Metasploit4 < Msf::Exploit::Remote
|
|||
This module abuses the SAP NetWeaver SXPG_COMMAND_EXECUTE function, on the SAP
|
||||
SOAP RFC Service, to execute remote commands. This module needs SAP credentials with
|
||||
privileges to use the /sap/bc/soap/rfc in order to work. The module has been tested
|
||||
successfully on Windows 2008 64 bits and Linux 64 bits platforms.
|
||||
successfully on Windows 2008 64-bit and Linux 64-bit platforms.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue