1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00

fix typos :-/

git-svn-id: file:///home/svn/framework3/trunk@8080 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
Joshua Drake 2010-01-06 20:09:34 +00:00
parent 97338e6848
commit c51c14bcba
2 changed files with 9 additions and 9 deletions

View File

@ -30,12 +30,12 @@ class Metasploit3 < Msf::Exploit::Remote
This service is installed with HP OpenView Data Protector, HP Application
Recovery Manager and potentially other products. This exploit has been tested
against versions 6.1, 6.0, and 5.50 of Data Protecter. and versions 6.0 and 6.1
against versions 6.1, 6.0, and 5.50 of Data Protector. and versions 6.0 and 6.1
of Application Recovery Manager.
NOTE: There are actually two consecutive wcscpy() calls in the program (which
may be why ZDI considered them two separate issues). However, this module only
exploits the frist one.
exploits the first one.
},
'Author' =>
[
@ -105,7 +105,7 @@ class Metasploit3 < Msf::Exploit::Remote
if (resp)
resp = resp.unpack('v*').pack('C*')
print_status("Recevied response: " + resp)
print_status("Received response: " + resp)
# extract version
if (resp =~ /HP Data Protector/)
@ -151,7 +151,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
resp = resp.unpack('v*').pack('C*')
print_status("Recevied response: " + resp)
print_status("Received response: " + resp)
self.targets.each do |t|
if (resp =~ /#{t.name}/) then
@ -172,7 +172,7 @@ class Metasploit3 < Msf::Exploit::Remote
# separator between arguments
sep = [0x2000].pack('N')
# unicode BOM
# Unicode BOM
pkt = "\xff\xfe"
# MSG_PROTOCOL command
pkt << Rex::Text.to_unicode("267")

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
This service is installed with HP OpenView Data Protector, HP Application
Recovery Manager and potentially other products. This exploit has been tested
against versions 6.1, 6.0, and 5.50 of Data Protecter. and versions 6.0 and 6.1
against versions 6.1, 6.0, and 5.50 of Data Protector. and versions 6.0 and 6.1
of Application Recovery Manager.
NOTE: There are actually two consecutive wcscpy() calls in the program (which
@ -105,7 +105,7 @@ class Metasploit3 < Msf::Exploit::Remote
if (resp)
resp = resp.unpack('v*').pack('C*')
print_status("Recevied response: " + resp)
print_status("Received response: " + resp)
# extract version
if (resp =~ /HP Data Protector/)
@ -151,7 +151,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
resp = resp.unpack('v*').pack('C*')
print_status("Recevied response: " + resp)
print_status("Received response: " + resp)
self.targets.each do |t|
if (resp =~ /#{t.name}/) then
@ -172,7 +172,7 @@ class Metasploit3 < Msf::Exploit::Remote
# separator between arguments
sep = [0x2000].pack('N')
# unicode BOM
# Unicode BOM
pkt = "\xff\xfe"
# MSG_PROTOCOL command
pkt << Rex::Text.to_unicode("267")