automatic module_metadata_base.json update
This commit is contained in:
parent
a13d13b578
commit
54afaedf23
|
@ -79106,8 +79106,8 @@
|
|||
"disclosure_date": "2013-04-22",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Tobias Ospelt <tobias@modzero.ch>",
|
||||
"Martin Schobert <schobert@modzero.ch>"
|
||||
"Tobias Ospelt",
|
||||
"Martin Schobert"
|
||||
],
|
||||
"description": "This module exploits a stack buffer overflow in Tinc's tincd\n service. After authentication, a specially crafted tcp packet (default port 655)\n leads to a buffer overflow and allows to execute arbitrary code. This module has\n been tested with tinc-1.1pre6 on Windows XP (custom calc payload) and Windows 7\n (windows/meterpreter/reverse_tcp), and tinc version 1.0.19 from the ports of\n FreeBSD 9.1-RELEASE # 0 and various other OS, see targets. The exploit probably works\n for all versions <= 1.1pre6.\n A manually compiled version (1.1.pre6) on Ubuntu 12.10 with gcc 4.7.2 seems to\n be a non-exploitable crash due to calls to __memcpy_chk depending on how tincd\n was compiled. Bug got fixed in version 1.0.21/1.1pre7. While writing this module\n it was recommended to the maintainer to start using DEP/ASLR and other protection\n mechanisms.",
|
||||
"references": [
|
||||
|
@ -79141,7 +79141,7 @@
|
|||
"Crash only: OpenSuse 11.2 x86, tinc 1.0.16 (rpm package)",
|
||||
"Crash only: Debian 7.3 ARM, tinc 1.0.19 (apt-get)"
|
||||
],
|
||||
"mod_time": "2017-07-24 06:26:21 +0000",
|
||||
"mod_time": "2019-10-02 13:35:25 +0000",
|
||||
"path": "/modules/exploits/multi/vpn/tincd_bof.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/vpn/tincd_bof",
|
||||
|
|
Loading…
Reference in New Issue