Metasploit mailing list archives
Running milw0rm Apple QuickTime 7.2/7.3 RSTP Response Universal Exploit (win/osx) oddity
From: mmiller at hick.org (mmiller at hick.org)
Date: Thu, 29 Nov 2007 14:37:45 -0800
On Thu, Nov 29, 2007 at 05:26:07PM -0500, Jeffs wrote:
I know this is not HOW to do it correctly, so can someone point me in the right direction on what parameters need to be included in the 4673.rb file at Milw0rm to make it show up in the .msfgui or .msfweb.
MC contributed an exploit for this issue which has been committed to trunk. The exploit's module name is: windows/misc/apple_quicktime_rtsp_response It can be found here: http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb
Current thread:
- Running milw0rm Apple QuickTime 7.2/7.3 RSTP Response Universal Exploit (win/osx) oddity Jeffs (Nov 29)
- Running milw0rm Apple QuickTime 7.2/7.3 RSTP Response Universal Exploit (win/osx) oddity mmiller at hick.org (Nov 29)
- Running milw0rm Apple QuickTime 7.2/7.3 RSTP Response Universal Exploit (win/osx) oddity H D Moore (Nov 29)