Metasploit mailing list archives

Running milw0rm Apple QuickTime 7.2/7.3 RSTP Response Universal Exploit (win/osx) oddity


From: mmiller at hick.org (mmiller at hick.org)
Date: Thu, 29 Nov 2007 14:37:45 -0800

On Thu, Nov 29, 2007 at 05:26:07PM -0500, Jeffs wrote:
I know this is not HOW to do it correctly, so can someone point me in 
the right direction on what parameters need to be included in the 
4673.rb file at Milw0rm to make it show up in the .msfgui or .msfweb.

MC contributed an exploit for this issue which has been committed to
trunk.  The exploit's module name is:

windows/misc/apple_quicktime_rtsp_response

It can be found here:

http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb





Current thread: