Skip to content

Commit f0cfcd4

Browse files
committed
Update dlsw_leak_capture name and print_
This makes it more obvious exactly what is being scanned for
1 parent 3aecd3a commit f0cfcd4

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/auxiliary/scanner/dlsw/dlsw_leak_capture.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize
1515
super(
16-
'Name' => 'Cisco DLSw Information Leak Scanner',
16+
'Name' => 'Cisco DLSw Information Disclosure Scanner',
1717
'Description' => %q(
18-
This module implements the DLSw information leak retrieval. There is
19-
a bug in Cisco's DLSw implementation affecting 12.x and 15.x trains
18+
This module implements the DLSw information disclosure retrieval. There
19+
is a bug in Cisco's DLSw implementation affecting 12.x and 15.x trains
2020
that allows an unuthenticated remote attacker to retrieve the partial
2121
contents of packets traversing a Cisco router with DLSw configured
2222
and active.
@@ -55,7 +55,7 @@ def get_response(size = 72)
5555

5656
# Called when using check
5757
def check_host(_ip)
58-
print_status("#{peer}: Checking for DLSw exposure")
58+
print_status("#{peer}: Checking for DLSw information disclosure (CVE-2014-7992)")
5959
response = get_response
6060

6161
if response.blank?
@@ -72,7 +72,7 @@ def check_host(_ip)
7272
# TODO: check that response has something that truly indicates it is vulnerable
7373
# and not simply that it responded
7474
unless response[18..72].scan(/\x00/).length == 54
75-
print_good("#{peer}: leaked #{response.length} bytes")
75+
print_good("#{peer}: vulnerable to DLSw information disclosure; leaked #{response.length} bytes")
7676
report_vuln(
7777
host: rhost,
7878
port: rport,

0 commit comments

Comments
 (0)