Skip to content

Commit 170608e

Browse files
committed
Fix first chunk of msftidy "bad char" errors
There needs to be a better way to go about preventing/fixing these.
1 parent 045900b commit 170608e

30 files changed

+95
-83
lines changed

modules/auxiliary/admin/cisco/cisco_secure_acs_bypass.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit4 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Cisco Secure ACS Version < 5.1.0.44.5 or 5.2.0.26.2 Unauthorized Password Change',
16+
'Name' => 'Cisco Secure ACS Unauthorized Password Change',
1717
'Description' => %q{
1818
This module exploits an authentication bypass issue which allows arbitrary
1919
password change requests to be issued for any user in the local store.

modules/auxiliary/dos/http/apache_mod_isapi.rb

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -12,25 +12,28 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Apache mod_isapi <= 2.2.14 Dangling Pointer',
15+
'Name' => 'Apache mod_isapi Dangling Pointer',
1616
'Description' => %q{
17-
This module triggers a use-after-free vulnerability in the Apache Software
18-
Foundation mod_isapi extension. In order to reach the vulnerable code, the
19-
target server must have an ISAPI module installed and configured.
17+
This module triggers a use-after-free vulnerability in the Apache
18+
Software Foundation mod_isapi extension for versions 2.2.14 and earlier.
19+
In order to reach the vulnerable code, the target server must have an
20+
ISAPI module installed and configured.
2021
21-
By making a request that terminates abnormally (either an aborted TCP connection or
22-
an unsatisfied chunked request), mod_isapi will unload the ISAPI extension. Later,
23-
if another request comes for that ISAPI module, previously obtained pointers will
24-
be used resulting in an access violation or potentially arbitrary code execution.
22+
By making a request that terminates abnormally (either an aborted TCP
23+
connection or an unsatisfied chunked request), mod_isapi will unload the
24+
ISAPI extension. Later, if another request comes for that ISAPI module,
25+
previously obtained pointers will be used resulting in an access
26+
violation or potentially arbitrary code execution.
2527
26-
Although arbitrary code execution is theoretically possible, a real-world method of
27-
invoking this consequence has not been proven. In order to do so, one would need to
28-
find a situation where a particular ISAPI module loads at an image base address
29-
that can be re-allocated by a remote attacker.
28+
Although arbitrary code execution is theoretically possible, a
29+
real-world method of invoking this consequence has not been proven. In
30+
order to do so, one would need to find a situation where a particular
31+
ISAPI module loads at an image base address that can be re-allocated by
32+
a remote attacker.
3033
31-
Limited success was encountered using two separate ISAPI modules. In this scenario,
32-
a second ISAPI module was loaded into the same memory area as the previously
33-
unloaded module.
34+
Limited success was encountered using two separate ISAPI modules. In
35+
this scenario, a second ISAPI module was loaded into the same memory
36+
area as the previously unloaded module.
3437
},
3538
'Author' =>
3639
[

modules/auxiliary/dos/mdns/avahi_portzero.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize
1414
super(
15-
'Name' => 'Avahi < 0.6.24 Source Port 0 DoS',
15+
'Name' => 'Avahi Source Port 0 DoS',
1616
'Description' => %q{
1717
Avahi-daemon versions prior to 0.6.24 can be DoS'd
18-
with an mDNS packet with a source port of 0
18+
with an mDNS packet with a source port of 0.
1919
},
2020
'Author' => 'kris katterjohn',
2121
'License' => MSF_LICENSE,

modules/auxiliary/dos/smtp/sendmail_prescan.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Sendmail SMTP Address prescan <= 8.12.8 Memory Corruption',
16+
'Name' => 'Sendmail SMTP Address prescan Memory Corruption',
1717
'Description' => %q{
1818
This is a proof of concept denial of service module for Sendmail versions
1919
8.12.8 and earlier. The vulnerability is within the prescan() method when

modules/auxiliary/dos/ssl/dtls_changecipherspec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS',
17+
'Name' => 'OpenSSL DTLS ChangeCipherSpec Remote DoS',
1818
'Description' => %q{
1919
This module performs a Denial of Service Attack against Datagram TLS in OpenSSL
2020
version 0.9.8i and earlier. OpenSSL crashes under these versions when it recieves a

modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'FileZilla FTP Server <=0.9.21 Malformed PORT Denial of Service',
16+
'Name' => 'FileZilla FTP Server Malformed PORT Denial of Service',
1717
'Description' => %q{
1818
This module triggers a Denial of Service condition in the FileZilla FTP
1919
Server versions 0.9.21 and earlier. By sending a malformed PORT command

modules/auxiliary/dos/windows/ftp/iis_list_exhaustion.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Microsoft IIS FTP Server <= 7.0 LIST Stack Exhaustion',
15+
'Name' => 'Microsoft IIS FTP Server LIST Stack Exhaustion',
1616
'Description' => %q{
1717
This module triggers Denial of Service condition in the Microsoft Internet
1818
Information Services (IIS) FTP Server 5.0 through 7.0 via a list (ls) -R command

modules/auxiliary/dos/windows/ftp/solarftp_user.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,12 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize(info={})
1414
super(update_info(info,
15-
'Name' => 'Solar FTP Server <= 2.1.1 Malformed (User) Denial of Service',
15+
'Name' => 'Solar FTP Server Malformed USER Denial of Service',
1616
'Description' => %q{
17-
This module will send a format string as USER to Solar FTP, causing a READ
18-
violation in function "__output_1()" found in "sfsservice.exe" while trying to
19-
calculate the length of the string.
17+
This module will send a format string as USER to Solar FTP, causing a
18+
READ violation in function "__output_1()" found in "sfsservice.exe"
19+
while trying to calculate the length of the string. This vulnerability
20+
affects versions 2.1.1 and earlier.
2021
},
2122
'Author' =>
2223
[

modules/auxiliary/dos/windows/http/pi3web_isapi.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,12 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Pi3Web <=2.0.13 ISAPI DoS',
15+
'Name' => 'Pi3Web ISAPI DoS',
1616
'Description' => %q{
17-
The Pi3Web HTTP server crashes when a request is made
18-
for an invalid DLL file in /isapi. By default, the
19-
non-DLLs in this directory after installation are
20-
users.txt, install.daf and readme.daf.
17+
The Pi3Web HTTP server crashes when a request is made for an invalid DLL
18+
file in /isapi for versions 2.0.13 and earlier. By default, the non-DLLs
19+
in this directory after installation are users.txt, install.daf and
20+
readme.daf.
2121
},
2222
'Author' => 'kris katterjohn',
2323
'License' => MSF_LICENSE,

modules/auxiliary/gather/eaton_nsm_creds.rb

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,14 @@ class Metasploit3 < Msf::Auxiliary
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Network Shutdown Module <= 3.21 (sort_values) Credential Dumper',
15+
'Name' => 'Network Shutdown Module sort_values Credential Dumper',
1616
'Description' => %q{
17-
This module will extract user credentials from Network Shutdown Module by exploiting
18-
a vulnerability found in lib/dbtools.inc, which uses unsanitized user input inside a
19-
eval() call. Please note that in order to extract credentials,the vulnerable service
20-
must have at least one USV module (an entry in the "nodes" table in mgedb.db)
17+
This module will extract user credentials from Network Shutdown Module
18+
versions 3.21 and earlier by exploiting a vulnerability found in
19+
lib/dbtools.inc, which uses unsanitized user input inside a eval() call.
20+
Please note that in order to extract credentials,the vulnerable service
21+
must have at least one USV module (an entry in the "nodes" table in
22+
mgedb.db).
2123
},
2224
'References' =>
2325
[

0 commit comments

Comments
 (0)