mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
typos
git-svn-id: file:///home/svn/framework3/trunk@9843 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
d07e613504
commit
3b4c732ec0
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
After close inspection, it appears that 3.0.x versions of Samba are not
|
||||
exploitable. Since they use an "InputBuffer" size of 0x20441, an attacker cannot
|
||||
cause memory to be corrupted in an exploitable way. It is possible to corrupt the
|
||||
heap header of the "InputBuffer", but it didn\'t seem possible to get the chunk
|
||||
heap header of the "InputBuffer", but it didn't seem possible to get the chunk
|
||||
to be processed again prior to process exit.
|
||||
|
||||
In order to gain code execution, this exploit attempts to overwrite a "talloc
|
||||
@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
This particular module is capable of exploiting the flaw on x86 Linux systems
|
||||
that do not have the nx memory protection.
|
||||
|
||||
NOTE: It is possible to make explotiation attempts indefinitely since Samba forks
|
||||
NOTE: It is possible to make exploitation attempts indefinitely since Samba forks
|
||||
for user sessions in the default configuration.
|
||||
},
|
||||
'Author' => [ 'jduck' ],
|
||||
|
Loading…
Reference in New Issue
Block a user