Metasploit mailing list archives
WFTPD Server 3.23 SIZE Command Buffer Overflow
From: msf-list at jervus.it (msf-list at jervus.it)
Date: Wed, 27 Dec 2006 12:55:13 +0000
oooooops !! thank's str0ke; the module is for the version 3.23 .....this is a beer overflow :-)) I've re-attached the module. Ciao Jacopo acaro
Da: str0ke <str0ke at milw0rm.com> Data: Tue, 26 Dec 2006 11:25:24 -0600 A: framework at metasploit.com Oggetto: How goes it acaro, The version information stated in the exploit code is for 2.23 but the advisories associated with the SIZE overflow vulnerability are for versions 3.23. I just wanted to make sure the version information was correct, or maybe your testing was on an older version? Regards, /str0ke On 12/26/06, msf-list at jervus.it <msf-list at jervus.it> wrote:Hi list! I've attached a module for WFTPD Server 2.23 SIZE Command Buffer Overflow. Ciao acaro
-------------- next part -------------- A non-text attachment was scrubbed... Name: wftpd_size_overflow.pm Type: application/octet-stream Size: 3923 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20061227/bc5ece6f/attachment.obj>
Current thread:
- WFTPD Server 2.23 SIZE Command Buffer Overflow msf-list at jervus.it (Dec 26)
- WFTPD Server 2.23 SIZE Command Buffer Overflow str0ke (Dec 26)
- WFTPD Server 3.23 SIZE Command Buffer Overflow msf-list at jervus.it (Dec 27)
- WFTPD Server 2.23 SIZE Command Buffer Overflow H D Moore (Dec 28)
- WFTPD Server 2.23 SIZE Command Buffer Overflow str0ke (Dec 26)