Updated osvdb references from Steve Tornio, updated capture/eth_spoof modules

git-svn-id: file:///home/svn/framework3/trunk@6907 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
HD Moore
2009-07-27 14:05:23 +00:00
parent 1b84ca5282
commit 876a80f601
58 changed files with 119 additions and 76 deletions
+1 -1
View File
@@ -118,7 +118,7 @@ class Metasploit3 < Msf::Auxiliary
end
true
end
close_pcap()
print_status("Finished sniffing")
end
end
+1 -1
View File
@@ -59,7 +59,7 @@ class Metasploit3 < Msf::Auxiliary
true
end
close_pcap()
print_status("Finished sniffing")
end
+2 -1
View File
@@ -37,7 +37,7 @@ class Metasploit3 < Msf::Auxiliary
print_status("Opening the network interface...")
open_pcap()
r = Racket::Racket.new
r = Racket::Racket.new
r.l2 = Racket::Ethernet.new
r.l2.ethertype = 0x0800
r.l2.src_mac = "00:41:41:41:41:41"
@@ -56,6 +56,7 @@ class Metasploit3 < Msf::Auxiliary
capture.inject(r.pack)
end
close_pcap()
print_status("Finished sending")
end
@@ -41,6 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-0608'],
[ 'OSVDB', '7217'],
[ 'BID', '10570'],
[ 'MIL', '72'],
@@ -122,4 +123,4 @@ class Metasploit3 < Msf::Exploit::Remote
return Exploit::CheckCode::Safe
end
end
end
@@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '55990' ],
[ 'BID', '35742' ],
[ 'URL', 'http://www.milw0rm.com/exploits/9209'],
+3 -2
View File
@@ -31,8 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '15131'],
['CVE', '2005-3252'],
['OSVDB', '20034'],
['BID', '15131'],
['URL','http://xforce.iss.net/xforce/alerts/id/207'] ,
],
'Payload' =>
@@ -106,4 +107,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect_udp
end
end
end
+2 -2
View File
@@ -31,9 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2000-0284' ],
[ 'OSVDB', '12037' ],
[ 'BID', '1110' ],
[ 'CVE', '2000-0284' ],
[ 'URL', 'http://www.milw0rm.com/exploits/284' ],
],
'Privileged' => false,
@@ -84,4 +84,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -32,12 +32,11 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-0541'],
[ 'OSVDB', '6791'],
[ 'URL', 'http://www.idefense.com/application/poi/display?id=107'],
[ 'BID', '10500'],
[ 'CVE', '2004-0541'],
[ 'MIL', '67'],
],
'Privileged' => false,
'Payload' =>
@@ -139,4 +138,4 @@ class Metasploit3 < Msf::Exploit::Remote
sock.put(req)
end
end
end
@@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', 'CVE-2008-5353' ],
[ 'OSVDB', '50500'],
[ 'URL', 'http://slightlyrandombrokenthoughts.blogspot.com/2008/12/calendar-bug.html' ],
[ 'URL', 'http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html' ],
[ 'URL', 'http://blog.cr0.org/2009/05/write-once-own-everyone.html' ],
@@ -30,8 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '11026' ],
[ 'CVE', '2004-1389' ],
[ 'OSVDB', '11026' ],
[ 'BID', '11494' ],
[ 'URL', 'http://seer.support.veritas.com/docs/271727.htm' ],
+2 -1
View File
@@ -35,6 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2004-0397'],
['OSVDB', '6301'],
['BID', '10386'],
['URL', 'http://lists.netsys.com/pipermail/full-disclosure/2004-May/021737.html'],
@@ -131,4 +132,4 @@ class Metasploit3 < Msf::Exploit::Remote
"#{buf.length}:" + buf
end
end
end
+3 -3
View File
@@ -32,9 +32,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '3517'],
[ 'OSVDB', '4503'],
[ 'CVE', '2001-0803'],
[ 'OSVDB', '4503'],
[ 'BID', '3517'],
[ 'URL', 'http://www.cert.org/advisories/CA-2001-31.html'],
[ 'URL', 'http://media.wiley.com/product_ancillary/83/07645446/DOWNLOAD/Source_Files.zip'],
[ 'MIL', '61'],
@@ -164,4 +164,4 @@ class Metasploit3 < Msf::Exploit::Remote
@spc_seq = 0
end
end
end
@@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2001-1583'],
[ 'OSVDB', '15131'],
[ 'BID', '3274'],
[ 'MIL', '63'],
@@ -47,6 +47,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => 'solaris',
'References' =>
[
['CVE', '2008-4556'],
['OSVDB', '49111'],
['URL', 'http://risesecurity.org/advisories/RISE-2008001.txt'],
],
'Privileged' => true,
@@ -33,9 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '8615'],
['CVE', '2003-0722'],
['OSVDB', '4585'],
['BID', '8615'],
['URL', 'http://lists.insecure.org/lists/vulnwatch/2003/Jul-Sep/0115.html'],
['MIL', '64']
],
@@ -24,9 +24,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '1749'],
['CVE', '1999-0209'],
['OSVDB', '11517'],
['BID', '1749'],
],
'Privileged' => true,
'Platform' => ['unix', 'solaris'],
+1
View File
@@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-0882' ],
[ 'OSVDB', '31881'],
[ 'BID', '22512' ],
],
'Privileged' => false,
+2 -1
View File
@@ -29,8 +29,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '5531'],
[ 'CVE', '2001-0797'],
[ 'OSVDB', '690'],
[ 'BID', '5531'],
[ 'MIL', '66'],
],
@@ -29,8 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '26177' ],
[ 'CVE', '2006-2447' ],
[ 'OSVDB', '26177' ],
[ 'BID', '18290' ],
[ 'URL', 'http://spamassassin.apache.org/advisories/cve-2006-2447.txt' ],
],
@@ -35,9 +35,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2005-2733'],
['OSVDB', '19012'],
['BID', '14667'],
['CVE', '2005-2733'],
['URL', 'http://www.milw0rm.com/exploits/1191'],
],
'Privileged' => false,
@@ -239,4 +239,4 @@ class Metasploit3 < Msf::Exploit::Remote
cmd_shell(cmdpath)
delete_file(cmdpath)
end
end
end
@@ -39,6 +39,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => [ 'Nicob <nicob[at]nicob.net>' ],
'References' =>
[
['CVE', '2003-0990'],
['OSVDB', '3178'],
['URL', 'http://lists.immunitysec.com/pipermail/dailydave/2007-July/004456.html'],
['URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=330'],
['URL', 'http://www.wslabi.com/wabisabilabi/initPublishedBid.do?'],
@@ -25,9 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2007-5423'],
['OSVDB', '40478'],
['BID', '26006'],
['CVE', '2007-5423'],
['MIL', '4525'],
],
'Privileged' => false,
@@ -27,9 +27,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2006-4602'],
['OSVDB', '28456'],
['BID', '19819'],
['CVE', '2006-4602'],
['MIL', '2288'],
['URL', 'http://secunia.com/advisories/21733/'],
],
@@ -30,8 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '22639'],
['CVE', '2007-1070'],
['OSVDB', '33042'],
['BID', '22639'],
],
'Privileged' => true,
'DefaultOptions' =>
@@ -81,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -30,8 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '23868'],
['CVE', '2007-2508'],
['OSVDB', '35790'],
['BID', '23868'],
],
'Privileged' => true,
'DefaultOptions' =>
@@ -82,4 +83,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -30,8 +30,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['BID', '23866'],
['CVE', '2007-2508'],
['OSVDB', '35789'],
['BID', '23866'],
],
'Privileged' => true,
'DefaultOptions' =>
@@ -81,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -40,9 +40,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-1172'],
[ 'OSVDB', '12418'],
[ 'BID', '11974'],
[ 'CVE', '2004-1172'],
[ 'URL', 'http://www.idefense.com/application/poi/display?id=169&type=vulnerabilities'],
[ 'MIL', '10'],
@@ -147,4 +147,4 @@ __END__
0000002C 4E dec esi
0000002D 85F6 test esi,esi
0000002F 75E1 jnz 0x12
00000031 FFD7 call edi
00000031 FFD7 call edi
@@ -33,8 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '14022'],
[ 'CVE', '2005-0773'],
[ 'OSVDB', '17624'],
[ 'BID', '14022'],
[ 'URL', 'http://www.idefense.com/application/poi/display?id=272&type=vulnerabilities'],
[ 'URL', 'http://seer.support.veritas.com/docs/276604.htm'],
[ 'MIL', '9'],
@@ -135,4 +136,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -25,8 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'MSB', 'MS08-041' ],
[ 'CVE', '2008-2463' ],
[ 'OSVDB', '46749'],
[ 'MSB', 'MS08-041' ],
[ 'BID', '30114' ],
],
'Payload' =>
@@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-1689' ],
[ 'OSVDB', '36164'],
[ 'URL', 'http://securityresponse.symantec.com/avcenter/security/Content/2007.05.16.html' ],
],
'DefaultOptions' =>
@@ -86,4 +87,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end
@@ -25,8 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'US-CERT-VU', '914785' ],
[ 'CVE', '2007-1682' ],
[ 'OSVDB', '47794' ],
[ 'US-CERT-VU', '914785' ],
[ 'BID', '30826' ],
],
'DefaultOptions' =>
@@ -116,4 +117,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end
@@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2007-5603'],
[ 'OSVDB', '39069'],
[ 'URL', 'http://www.sec-consult.com/303.html' ],
],
'DefaultOptions' =>
@@ -92,4 +94,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end
@@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2008-4388' ],
[ 'OSVDB', '51410' ],
],
'Payload' =>
{
@@ -28,6 +28,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', 'CVE-2007-6016' ],
[ 'OSVDB', '42358'],
[ 'BID', '26904' ],
[ 'URL', 'http://secunia.com/advisories/27885/' ],
],
@@ -125,4 +126,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end
@@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2007-0325' ],
[ 'OSVDB', '33040' ],
[ 'BID', '22585' ],
],
'DefaultOptions' =>
@@ -92,4 +93,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end
@@ -32,6 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-1724'],
[ 'OSVDB', '44252'],
[ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ],
],
'DefaultOptions' =>
@@ -90,4 +92,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler(cli)
end
end
end
@@ -25,6 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-5492'],
[ 'OSVDB', '49871'],
[ 'BID','32313' ],
],
'DefaultOptions' =>
@@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '55945'],
[ 'BID','33053' ],
],
'DefaultOptions' =>
@@ -31,8 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2005-0308' ],
[ 'BID', '12352' ],
[ 'OSVDB', '13169' ],
[ 'BID', '12352' ],
[ 'URL', 'http://aluigi.altervista.org/adv/w32dasmbof-adv.txt' ],
],
'DefaultOptions' =>
+2 -2
View File
@@ -40,13 +40,13 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-0330'],
[ 'OSVDB', '4073'],
[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-02/0654.html'],
[ 'URL', 'http://www.cnhonker.com/advisory/serv-u.mdtm.txt'],
[ 'URL', 'http://www.cnhonker.com/index.php?module=releases&act=view&type=3&id=54'],
[ 'MIL', '59'],
[ 'BID', '9751'],
[ 'CVE', '2004-0330'],
],
'Privileged' => false,
@@ -198,4 +198,4 @@ class Metasploit3 < Msf::Exploit::Remote
return (res and res =~ /^500/) ? true : false
end
end
end
@@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2005-2373'],
[ 'OSVDB', '18172'],
[ 'BID', '14339'],
[ 'MIL', '92'],
@@ -77,4 +78,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
+3 -2
View File
@@ -29,8 +29,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '19617' ],
[ 'CVE', '2006-4318' ],
[ 'OSVDB', '28134' ],
[ 'BID', '19617' ],
],
'Privileged' => true,
'DefaultOptions' =>
@@ -69,4 +70,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -41,6 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2004-0608'],
[ 'OSVDB', '7217'],
[ 'BID', '10570'],
[ 'MIL', '73'],
@@ -119,4 +120,4 @@ class Metasploit3 < Msf::Exploit::Remote
return Exploit::CheckCode::Safe
end
end
end
@@ -31,9 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '5686' ],
[ 'CVE', '2002-1120' ],
[ 'OSVDB', '9829' ],
[ 'BID', '5686' ],
[ 'URL', 'http://www.milw0rm.com/exploits/787' ],
],
'Privileged' => false,
@@ -121,4 +121,4 @@ class Metasploit3 < Msf::Exploit::Remote
handler
disconnect
end
end
end
@@ -18,9 +18,9 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Steamcast <= 0.9.75 HTTP User-Agent Buffer Overflow',
'Name' => 'Streamcast <= 0.9.75 HTTP User-Agent Buffer Overflow',
'Description' => %q{
This module exploits a stack overflow in Steamcast <= 0.9.75. By sending
This module exploits a stack overflow in Streamcast <= 0.9.75. By sending
an overly long User-Agent in a HTTP GET request, an attacker may be able to
execute arbitrary code.
},
@@ -32,8 +32,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '42670' ],
[ 'CVE', '2008-0550' ],
[ 'OSVDB', '42670' ],
[ 'URL', 'http://aluigi.altervista.org/adv/steamcazz-adv.txt'],
# [ 'BID', '' ], # No entry as yet
],
@@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '17996'],
[ 'BID', '14287'],
],
'Privileged' => false,
@@ -88,4 +89,4 @@ class Metasploit3 < Msf::Exploit::Remote
sleep(4)
end
end
end
@@ -35,9 +35,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2005-0478'],
[ 'OSVDB', '13953'],
[ 'OSVDB', '13955'],
[ 'CVE', '2005-0478'],
[ 'BID', '12592'],
[ 'URL', 'http://aluigi.altervista.org/adv/tcambof-adv.txt'],
[ 'MIL', '69'],
@@ -159,4 +159,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end
end
@@ -33,9 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '12742'],
[ 'CVE', '2005-0353'],
[ 'OSVDB', '14605'],
[ 'BID', '12742'],
[ 'MIL', '58'],
],
@@ -103,4 +103,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end
@@ -31,7 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2004-1595'], ['BID', '11409'],
['CVE', '2004-1595'],
['OSVDB', '10721'],
['BID', '11409'],
],
'DefaultOptions' =>
{
@@ -84,4 +86,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -29,6 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2007-2711'],
['OSVDB', '36053'],
['BID', '23981'],
],
'Payload' =>
@@ -71,4 +73,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -56,7 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['OSVDB', '12002'],
['BID', '7519'],
['MIL', '57'],
['MIL', '638'],
],
'Privileged' => true,
'DefaultOptions' =>
@@ -116,4 +116,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -26,6 +26,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2009-1350' ],
[ 'OSVDB', '53351' ],
[ 'BID', '34400' ],
[ 'URL', 'http://www.reversemode.com/index.php?option=com_content&task=view&id=62&Itemid=1' ],
],
@@ -29,10 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '11535' ],
[ 'CVE', '2004-1638' ],
[ 'URL', 'http://milw0rm.com/exploits/598' ],
[ 'OSVDB', '11174' ],
[ 'BID', '11535' ],
[ 'URL', 'http://milw0rm.com/exploits/598' ],
],
'Privileged' => true,
'DefaultOptions' =>
@@ -85,4 +85,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
+2 -1
View File
@@ -30,6 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2005-2287' ],
[ 'OSVDB', '17883' ],
[ 'BID', '14213' ],
],
'DefaultOptions' =>
@@ -69,4 +70,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect
end
end
end
@@ -31,8 +31,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '5287' ],
[ 'CVE', '2002-1059' ],
[ 'OSVDB', '4991' ],
[ 'BID', '5287' ],
],
'DefaultOptions' =>
{
@@ -74,4 +75,4 @@ class Metasploit3 < Msf::Exploit::Remote
service.close_client(client)
end
end
end
@@ -30,6 +30,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
['CVE', '2002-2226'],
['OSVDB', '45903'],
['BID', '6199'],
],
'DefaultOptions' =>
@@ -84,4 +86,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect_udp
end
end
end
@@ -28,9 +28,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '20131' ],
[ 'OSVDB', '29032' ],
[ 'CVE', '2006-4948' ],
[ 'OSVDB', '29032' ],
[ 'BID', '20131' ],
[ 'URL', 'http://www.milw0rm.com/exploits/3132' ],
],
'DefaultOptions' =>
@@ -70,4 +70,4 @@ class Metasploit3 < Msf::Exploit::Remote
disconnect_udp
end
end
end
@@ -27,8 +27,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'BID', '17378' ],
[ 'CVE', '2006-1652' ],
[ 'OSVDB', '24456' ],
[ 'BID', '17378' ],
],
'DefaultOptions' =>
{
@@ -81,4 +82,4 @@ class Metasploit3 < Msf::Exploit::Remote
service.close_client(client)
end
end
end