File tree Expand file tree Collapse file tree 1 file changed +5
-5
lines changed
modules/auxiliary/scanner/dlsw Expand file tree Collapse file tree 1 file changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -13,10 +13,10 @@ class Metasploit3 < Msf::Auxiliary
13
13
14
14
def initialize
15
15
super (
16
- 'Name' => 'Cisco DLSw Information Leak Scanner' ,
16
+ 'Name' => 'Cisco DLSw Information Disclosure Scanner' ,
17
17
'Description' => %q(
18
- This module implements the DLSw information leak retrieval. There is
19
- a bug in Cisco's DLSw implementation affecting 12.x and 15.x trains
18
+ This module implements the DLSw information disclosure retrieval. There
19
+ is a bug in Cisco's DLSw implementation affecting 12.x and 15.x trains
20
20
that allows an unuthenticated remote attacker to retrieve the partial
21
21
contents of packets traversing a Cisco router with DLSw configured
22
22
and active.
@@ -55,7 +55,7 @@ def get_response(size = 72)
55
55
56
56
# Called when using check
57
57
def check_host ( _ip )
58
- print_status ( "#{ peer } : Checking for DLSw exposure " )
58
+ print_status ( "#{ peer } : Checking for DLSw information disclosure (CVE-2014-7992) " )
59
59
response = get_response
60
60
61
61
if response . blank?
@@ -72,7 +72,7 @@ def check_host(_ip)
72
72
# TODO: check that response has something that truly indicates it is vulnerable
73
73
# and not simply that it responded
74
74
unless response [ 18 ..72 ] . scan ( /\x00 / ) . length == 54
75
- print_good ( "#{ peer } : leaked #{ response . length } bytes" )
75
+ print_good ( "#{ peer } : vulnerable to DLSw information disclosure; leaked #{ response . length } bytes" )
76
76
report_vuln (
77
77
host : rhost ,
78
78
port : rport ,
You can’t perform that action at this time.
0 commit comments