File tree Expand file tree Collapse file tree 2 files changed +6
-5
lines changed Expand file tree Collapse file tree 2 files changed +6
-5
lines changed Original file line number Diff line number Diff line change @@ -13,10 +13,10 @@ class Metasploit3 < Msf::Exploit::Remote
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'Achat Stack Based Buffer Overflow' ,
16
+ 'Name' => 'Achat Unicode SEH Buffer Overflow' ,
17
17
'Description' => %q{
18
- This module exploits a Unicode SEH based stack based buffer overflow in Achat. By
19
- sending a crafted message to the default port UDP/ 9256, it's possible to overwrite the
18
+ This module exploits a Unicode SEH buffer overflow in Achat. By
19
+ sending a crafted message to the default port 9256/UDP , it's possible to overwrite the
20
20
SEH handler. Even when the exploit is reliable, it depends of timing since there are
21
21
two threads overflowing the stack in the same time. This module has been tested on
22
22
Achat v0.150 running on Windows XP SP3 and Windows 7.
Original file line number Diff line number Diff line change @@ -14,10 +14,11 @@ class Metasploit3 < Msf::Post
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
16
'Name' => 'Windows File Gather File from Raw NTFS' ,
17
- 'Description' => %q(
17
+ 'Description' => %q{
18
18
This module gathers a file using the raw NTFS device, bypassing some Windows restrictions
19
19
such as open file with write lock. Because it avoids the usual file locking issues, it can
20
- be used to retrieve files such as NTDS.dit.) ,
20
+ be used to retrieve files such as NTDS.dit.
21
+ } ,
21
22
'License' => 'MSF_LICENSE' ,
22
23
'Platform' => [ 'win' ] ,
23
24
'SessionTypes' => [ 'meterpreter' ] ,
You can’t perform that action at this time.
0 commit comments