/// File Name: |
xitami_if_mod_since.rb.txt |
Description:
|
This Metasploit module exploits a stack overflow in the iMatix Corporation Xitami Web Server. If a malicious user sends an If-Modified-Since header containing an overly long string, it may be possible to execute a payload remotely. Due to size constraints, this module uses the Egghunter technique. You may wish to adjust WfsDelay appropriately.
| Author: | patrick | Homepage: | http://www.metasploit.com | File Size: | 2509 | Related OSVDB(s): | 40594,40595 | Related CVE(s): | CVE-2007-5067 | Last Modified: | Nov 25 19:34:53 2009 |
MD5 Checksum: | 48d6579e6e00ef854fbca505ed14d8f4 |
|