You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/exploits/linux/misc/quest_pmmasterd_bof.rb
+3-1Lines changed: 3 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,9 @@ def initialize(info = {})
22
22
requests of type ACT_ALERT_EVENT, where the size of a memcpy can be
23
23
controlled by the attacker. This module only works against version < 6.0.0-27.
24
24
Versions up to 6.0.0-50 are also vulnerable, but not supported by this module (a stack cookie bypass is required).
25
-
NOTE: To use this module it is required to be able to bind a privileged port ( <=1024 ) as the server refuses connections coming from unprivileged ports, which in most situations means that root privileges are required.
25
+
NOTE: To use this module it is required to be able to bind a privileged port ( <=1024 )
26
+
as the server refuses connections coming from unprivileged ports, which in most situations
0 commit comments