automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2019-10-03 12:07:47 -05:00
parent a13d13b578
commit 54afaedf23
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 3 additions and 3 deletions

View File

@ -79106,8 +79106,8 @@
"disclosure_date": "2013-04-22",
"type": "exploit",
"author": [
"Tobias Ospelt <tobias@modzero.ch>",
"Martin Schobert <schobert@modzero.ch>"
"Tobias Ospelt",
"Martin Schobert"
],
"description": "This module exploits a stack buffer overflow in Tinc's tincd\n service. After authentication, a specially crafted tcp packet (default port 655)\n leads to a buffer overflow and allows to execute arbitrary code. This module has\n been tested with tinc-1.1pre6 on Windows XP (custom calc payload) and Windows 7\n (windows/meterpreter/reverse_tcp), and tinc version 1.0.19 from the ports of\n FreeBSD 9.1-RELEASE # 0 and various other OS, see targets. The exploit probably works\n for all versions <= 1.1pre6.\n A manually compiled version (1.1.pre6) on Ubuntu 12.10 with gcc 4.7.2 seems to\n be a non-exploitable crash due to calls to __memcpy_chk depending on how tincd\n was compiled. Bug got fixed in version 1.0.21/1.1pre7. While writing this module\n it was recommended to the maintainer to start using DEP/ASLR and other protection\n mechanisms.",
"references": [
@ -79141,7 +79141,7 @@
"Crash only: OpenSuse 11.2 x86, tinc 1.0.16 (rpm package)",
"Crash only: Debian 7.3 ARM, tinc 1.0.19 (apt-get)"
],
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2019-10-02 13:35:25 +0000",
"path": "/modules/exploits/multi/vpn/tincd_bof.rb",
"is_install_path": true,
"ref_name": "multi/vpn/tincd_bof",