metasploit-framework/modules/payloads/singles
James Lee 828f37701d Fix linux shell_bind_tcp payload
It was calling bind(2) with a family of 0x02ff, which makes no sense and
causes execution to fall off the end and segfault.  Fix it by replacing
0x02ff with the appropriate 0x0002, or AF_INET.

[Fixrm #7216]
2012-09-04 04:23:48 -05:00
..
aix/ppc Massive whitespace cleanup 2012-03-18 00:07:27 -05:00
bsd Comply with msftidy 2012-08-07 15:59:01 -05:00
bsdi/x86 Fix up the boilerplate comment to use a better url 2012-02-20 19:40:50 -06:00
cmd Comply with msftidy 2012-08-07 15:59:01 -05:00
generic Massive whitespace cleanup 2012-03-18 00:07:27 -05:00
java Fix up the boilerplate comment to use a better url 2012-02-20 19:40:50 -06:00
linux Fix linux shell_bind_tcp payload 2012-09-04 04:23:48 -05:00
osx I missed one 2012-08-14 16:51:55 -05:00
php Comply with msftidy 2012-08-07 15:59:01 -05:00
solaris Fixes #6308: Fall back to 127.0.0.1 when SocketError is raised from the resolver 2012-02-25 13:00:48 -06:00
tty/unix Comply with msftidy 2012-08-07 15:59:01 -05:00
windows Comply with msftidy 2012-08-07 15:59:01 -05:00