Permalink
Browse files

Correct e-mail format, description, and some commas.

  • Loading branch information...
1 parent 4a53767 commit 4987acc70375e3f41a693c5902113b5dd532a661 @sinn3r sinn3r committed Jun 18, 2012
Showing with 6 additions and 6 deletions.
  1. +6 −6 modules/exploits/windows/http/ezserver_http.rb
@@ -19,28 +19,28 @@ def initialize(info = {})
'Name' => 'EZHomeTech EzServer <= 6.4.017 Stack Buffer Overflow Vulnerability',
'Description' => %q{
This module exploits a stack buffer overflow in the EZHomeTech EZServer. If a malicious
- user sends packets containing an overly long string, it may be possible to execute a
- payload remotely. Due to size constraints, this module uses the Egghunter technique.
+ user sends packets containing an overly long string, it may be possible to execute a
+ payload remotely. Due to size constraints, this module uses the Egghunter technique.
},
'License' => MSF_LICENSE,
'Author' =>
[
- 'modpr0be<modpr0be@spentera.com>', # Original discovery and Metasploit module
+ 'modpr0be<modpr0be[at]spentera.com>' # Original discovery and Metasploit module
],
'References' =>
[
[ 'EDB', '19266' ],
- [ 'URL', 'http://www.spentera.com/2012/06/ezhometech-ezserver-6-4-017-stack-overflow-vulnerability/' ],
+ [ 'URL', 'http://www.spentera.com/2012/06/ezhometech-ezserver-6-4-017-stack-overflow-vulnerability/' ]
],
'DefaultOptions' =>
{
- 'ExitFunction' => 'seh',
+ 'ExitFunction' => 'seh'
},
'Platform' => 'win',
'Payload' =>
{
'BadChars' => "\x00\x0a\x0d\x20\x2e\x2f\x3a",
- 'DisableNops' => true,
+ 'DisableNops' => true
},
'Targets' =>
[

0 comments on commit 4987acc

Please sign in to comment.