mailing list archives
GPSD server Format String Exploit
From: mmiller at hick.org (mmiller at hick.org)
Date: Sun, 7 Jan 2007 13:54:16 -0800
On Sun, Jan 07, 2007 at 05:52:37PM +0100, SENOTIER Yann wrote:
Sorry to repost this message but I didn't receive answers.
I have coded a module for Berlios GPSD Format String Vulnerability. It
is coded in the Perl language for the stable version of metasploit.
Are you still developing this version of Metasploit or are you just
working on the version 3.0? I can transcript it in ruby so let me know
what is the best solution.
Thank you very much
At this point all future development is being done against the 3.0
branch unless there is a compelling reason to backport to 2.x.
Submitting a 3.0 compatible version of your exploit would be greatly