1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-01-08 14:36:22 +01:00
Go to file
Tod Beardsley baea22f96c Bump to 0.9.8za (CVE-2014-0224 and friends)
Meterpreter's build scripts dynamically pull in OpenSSL from the
canonical remote site, https://openssl.org.

This ensures that we pull in 0.9.8za, which is patched against the
various OpenSSL vulns described at

https://www.openssl.org/news/secadv_20140605.txt

The SHA1sum should be:

adca1eb1a103a5536b24e1ed7e45051e2939731  openssl-0.9.8za.tar.gz

The MD5sum should be:

2f989915f8fea49aa1bc37aa58500cce  openssl-0.9.8za.tar.gz
2014-06-05 11:57:31 -05:00
c/meterpreter Bump to 0.9.8za (CVE-2014-0224 and friends) 2014-06-05 11:57:31 -05:00