mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
fix typos :-/
git-svn-id: file:///home/svn/framework3/trunk@8080 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
97338e6848
commit
c51c14bcba
@ -30,12 +30,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
This service is installed with HP OpenView Data Protector, HP Application
|
||||
Recovery Manager and potentially other products. This exploit has been tested
|
||||
against versions 6.1, 6.0, and 5.50 of Data Protecter. and versions 6.0 and 6.1
|
||||
against versions 6.1, 6.0, and 5.50 of Data Protector. and versions 6.0 and 6.1
|
||||
of Application Recovery Manager.
|
||||
|
||||
NOTE: There are actually two consecutive wcscpy() calls in the program (which
|
||||
may be why ZDI considered them two separate issues). However, this module only
|
||||
exploits the frist one.
|
||||
exploits the first one.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
@ -105,7 +105,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
if (resp)
|
||||
resp = resp.unpack('v*').pack('C*')
|
||||
print_status("Recevied response: " + resp)
|
||||
print_status("Received response: " + resp)
|
||||
|
||||
# extract version
|
||||
if (resp =~ /HP Data Protector/)
|
||||
@ -151,7 +151,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
end
|
||||
|
||||
resp = resp.unpack('v*').pack('C*')
|
||||
print_status("Recevied response: " + resp)
|
||||
print_status("Received response: " + resp)
|
||||
|
||||
self.targets.each do |t|
|
||||
if (resp =~ /#{t.name}/) then
|
||||
@ -172,7 +172,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
# separator between arguments
|
||||
sep = [0x2000].pack('N')
|
||||
|
||||
# unicode BOM
|
||||
# Unicode BOM
|
||||
pkt = "\xff\xfe"
|
||||
# MSG_PROTOCOL command
|
||||
pkt << Rex::Text.to_unicode("267")
|
||||
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
This service is installed with HP OpenView Data Protector, HP Application
|
||||
Recovery Manager and potentially other products. This exploit has been tested
|
||||
against versions 6.1, 6.0, and 5.50 of Data Protecter. and versions 6.0 and 6.1
|
||||
against versions 6.1, 6.0, and 5.50 of Data Protector. and versions 6.0 and 6.1
|
||||
of Application Recovery Manager.
|
||||
|
||||
NOTE: There are actually two consecutive wcscpy() calls in the program (which
|
||||
@ -105,7 +105,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
if (resp)
|
||||
resp = resp.unpack('v*').pack('C*')
|
||||
print_status("Recevied response: " + resp)
|
||||
print_status("Received response: " + resp)
|
||||
|
||||
# extract version
|
||||
if (resp =~ /HP Data Protector/)
|
||||
@ -151,7 +151,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
end
|
||||
|
||||
resp = resp.unpack('v*').pack('C*')
|
||||
print_status("Recevied response: " + resp)
|
||||
print_status("Received response: " + resp)
|
||||
|
||||
self.targets.each do |t|
|
||||
if (resp =~ /#{t.name}/) then
|
||||
@ -172,7 +172,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
# separator between arguments
|
||||
sep = [0x2000].pack('N')
|
||||
|
||||
# unicode BOM
|
||||
# Unicode BOM
|
||||
pkt = "\xff\xfe"
|
||||
# MSG_PROTOCOL command
|
||||
pkt << Rex::Text.to_unicode("267")
|
||||
|
Loading…
Reference in New Issue
Block a user