Correct typo and set the disclosure date

This commit is contained in:
HD Moore 2012-01-04 19:46:56 -06:00
parent 7b692aa0b9
commit 8315709fb6
2 changed files with 6 additions and 6 deletions

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'FreeBSD Telnet Service Encyption Key ID Buffer Overflow', 'Name' => 'FreeBSD Telnet Service Encryption Key ID Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a buffer overflow in the encryption option handler of the This module exploits a buffer overflow in the encryption option handler of the
FreeBSD telnet service. FreeBSD telnet service.
@ -58,8 +58,8 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'FreeBSD 5.3', { 'Ret' => 0x8059730 } ], # direct return [ 'FreeBSD 5.3', { 'Ret' => 0x8059730 } ], # direct return
# Versions 5.2 and below do not support encyption # Versions 5.2 and below do not support encyption
], ],
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'DisclosureDate' => '')) 'DisclosureDate' => 'Dec 23 2011'))
end end
def exploit_target(t) def exploit_target(t)

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Linux BSD-derived Telnet Service Encyption Key ID Buffer Overflow', 'Name' => 'Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a buffer overflow in the encryption option handler of the This module exploits a buffer overflow in the encryption option handler of the
Linux BSD-derived telnet service (inetutils or krb5-telnet). Most Linux distributions Linux BSD-derived telnet service (inetutils or krb5-telnet). Most Linux distributions
@ -51,8 +51,8 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Automatic', { } ], [ 'Automatic', { } ],
[ 'Red Hat Enterprise Linux 3 (krb5-telnet)', { 'Ret' => 0x0804b43c } ], [ 'Red Hat Enterprise Linux 3 (krb5-telnet)', { 'Ret' => 0x0804b43c } ],
], ],
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'DisclosureDate' => '')) 'DisclosureDate' => 'Dec 23 2011'))
end end
def exploit_target(t) def exploit_target(t)