1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00
git-svn-id: file:///home/svn/framework3/trunk@9843 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Joshua Drake 2010-07-16 03:34:22 +00:00
parent d07e613504
commit 3b4c732ec0

View File

@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
After close inspection, it appears that 3.0.x versions of Samba are not
exploitable. Since they use an "InputBuffer" size of 0x20441, an attacker cannot
cause memory to be corrupted in an exploitable way. It is possible to corrupt the
heap header of the "InputBuffer", but it didn\'t seem possible to get the chunk
heap header of the "InputBuffer", but it didn't seem possible to get the chunk
to be processed again prior to process exit.
In order to gain code execution, this exploit attempts to overwrite a "talloc
@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
This particular module is capable of exploiting the flaw on x86 Linux systems
that do not have the nx memory protection.
NOTE: It is possible to make explotiation attempts indefinitely since Samba forks
NOTE: It is possible to make exploitation attempts indefinitely since Samba forks
for user sessions in the default configuration.
},
'Author' => [ 'jduck' ],