Skip to content

Commit 517f264

Browse files
committed
Add last chunk of fixes
1 parent 25ebb05 commit 517f264

29 files changed

+55
-52
lines changed

modules/exploits/windows/http/icecast_header.rb

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -12,23 +12,20 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Icecast (<= 2.0.1) Header Overwrite (win32)',
15+
'Name' => 'Icecast Header Overwrite',
1616
'Description' => %q{
17-
This module exploits a buffer overflow in the header parsing
18-
of icecast, discovered by Luigi Auriemma. Sending 32 HTTP
19-
headers will cause a write one past the end of a pointer
20-
array. On win32 this happens to overwrite the saved
21-
instruction pointer, and on linux (depending on compiler,
22-
etc) this seems to generally overwrite nothing crucial (read
23-
not exploitable).
24-
25-
!! This exploit uses ExitThread(), this will leave icecast
26-
thinking the thread is still in use, and the thread counter
27-
won't be decremented. This means for each time your payload
28-
exits, the counter will be left incremented, and eventually
29-
the threadpool limit will be maxed. So you can multihit,
30-
but only till you fill the threadpool.
17+
This module exploits a buffer overflow in the header parsing of icecast
18+
versions 2.0.1 and earlier, discovered by Luigi Auriemma. Sending 32
19+
HTTP headers will cause a write one past the end of a pointer array. On
20+
win32 this happens to overwrite the saved instruction pointer, and on
21+
linux (depending on compiler, etc) this seems to generally overwrite
22+
nothing crucial (read not exploitable).
3123
24+
This exploit uses ExitThread(), this will leave icecast thinking the
25+
thread is still in use, and the thread counter won't be decremented.
26+
This means for each time your payload exits, the counter will be left
27+
incremented, and eventually the threadpool limit will be maxed. So you
28+
can multihit, but only till you fill the threadpool.
3229
},
3330
'Author' => [ 'spoonm', 'Luigi Auriemma <aluigi[at]autistici.org>' ],
3431
'License' => MSF_LICENSE,

modules/exploits/windows/http/kolibri_http.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,10 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info = {})
1717
super(update_info(info,
18-
'Name' => 'Kolibri <= v2.0 HTTP Server HEAD Buffer Overflow',
19-
'Description' => %q{This exploits a stack buffer overflow in version 2 of the Kolibri HTTP server.},
18+
'Name' => 'Kolibri HTTP Server HEAD Buffer Overflow',
19+
'Description' => %q{
20+
This exploits a stack buffer overflow in version 2 of the Kolibri HTTP server.
21+
},
2022
'Author' =>
2123
[
2224
'mr_me <steventhomasseeley[at]gmail.com>', # msf

modules/exploits/windows/http/mdaemon_worldclient_form2raw.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'MDaemon <= 6.8.5 WorldClient form2raw.cgi Stack Buffer Overflow',
16+
'Name' => 'MDaemon WorldClient form2raw.cgi Stack Buffer Overflow',
1717
'Description' => %q{
1818
This module exploits a stack buffer overflow in Alt-N MDaemon SMTP server for
1919
versions 6.8.5 and earlier. When WorldClient HTTP server is installed (default),

modules/exploits/windows/http/peercast_url.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'PeerCast <= 0.1216 URL Handling Buffer Overflow (win32)',
15+
'Name' => 'PeerCast URL Handling Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in PeerCast <= v0.1216.
1818
The vulnerability is caused due to a boundary error within the

modules/exploits/windows/http/shttpd_post.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'SHTTPD <= 1.34 URI-Encoded POST Request Overflow (win32)',
15+
'Name' => 'SHTTPD URI-Encoded POST Request Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in SHTTPD <= 1.34.
1818
The vulnerability is caused due to a boundary error within the

modules/exploits/windows/http/steamcast_useragent.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Streamcast <= 0.9.75 HTTP User-Agent Buffer Overflow',
16+
'Name' => 'Streamcast HTTP User-Agent Buffer Overflow',
1717
'Description' => %q{
1818
This module exploits a stack buffer overflow in Streamcast <= 0.9.75. By sending
1919
an overly long User-Agent in an HTTP GET request, an attacker may be able to

modules/exploits/windows/imap/mercury_login.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Mercury/32 <= 4.01b LOGIN Buffer Overflow',
15+
'Name' => 'Mercury/32 LOGIN Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in Mercury/32 <= 4.01b IMAPD
1818
LOGIN verb. By sending a specially crafted login command, a buffer

modules/exploits/windows/imap/novell_netmail_append.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Novell NetMail <= 3.52d IMAP APPEND Buffer Overflow',
15+
'Name' => 'Novell NetMail IMAP APPEND Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in Novell's Netmail 3.52 IMAP APPEND
1818
verb. By sending an overly long string, an attacker can overwrite the

modules/exploits/windows/imap/novell_netmail_auth.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Novell NetMail <=3.52d IMAP AUTHENTICATE Buffer Overflow',
15+
'Name' => 'Novell NetMail IMAP AUTHENTICATE Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in Novell's NetMail 3.52 IMAP AUTHENTICATE
1818
GSSAPI command. By sending an overly long string, an attacker can overwrite the

modules/exploits/windows/imap/novell_netmail_status.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'Novell NetMail <= 3.52d IMAP STATUS Buffer Overflow',
15+
'Name' => 'Novell NetMail IMAP STATUS Buffer Overflow',
1616
'Description' => %q{
1717
This module exploits a stack buffer overflow in Novell's Netmail 3.52 IMAP STATUS
1818
verb. By sending an overly long string, an attacker can overwrite the

0 commit comments

Comments
 (0)