Metasploit mailing list archives
Bug in apple_quicktime_rtsp_response
From: grutz at jingojango.net (Kurt Grutzmacher)
Date: Mon, 26 Nov 2007 17:20:01 -0600
Easy to fix. Line 99 should be:
handler(client)
instead of just handler. Otherwise you only get one shot to attack:
[11/26/2007 14:26:45] [e(0)] core: Error (ArgumentError) in stream server listener monitor: wrong number of arguments
(0 for 1)
Call stack:
./lib/msf/core/exploit.rb:1106:in `handler'
./lib/msf/core/exploit.rb:1106:in `handler'
./metasploit/framework3/trunk/modules/exploits/windows/misc/apple_quicktime_rtsp_response.rb:99:in `on_client_connect'
[snip]
--
..:[ grutz at jingojango dot net ]:..
GPG fingerprint: 5FD6 A27D 63DB 3319 140F B3FB EC95 2A03 8CB3 ECB4
"There's just no amusing way to say, 'I have a CISSP'."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071126/da0dde6e/attachment.pgp>
Current thread:
- Bug in apple_quicktime_rtsp_response Kurt Grutzmacher (Nov 26)
