From 83e7971bfae9c7302098c2d2c661b31277dfb107 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Mon, 30 Jun 2014 04:36:46 +0000 Subject: [PATCH] Updated 06_30_2014 --- files.csv | 2 +- platforms/multiple/remote/32791.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/files.csv b/files.csv index be9b6b3fe..8bc0bb28b 100755 --- a/files.csv +++ b/files.csv @@ -29521,7 +29521,7 @@ id,file,description,date,author,platform,type,port 32785,platforms/php/webapps/32785.txt,"Bitrix Site Manager 6/7 Multiple Input Validation Vulnerabilities",2009-02-09,aGGreSSor,php,webapps,0 32789,platforms/unix/remote/32789.rb,"Sophos Web Protection Appliance Interface Authenticated Arbitrary Command Execution",2014-04-10,metasploit,unix,remote,443 32790,platforms/php/webapps/32790.txt,"XCloner Standalone 3.5 - CSRF Vulnerability",2014-04-10,"High-Tech Bridge SA",php,webapps,80 -32791,platforms/multiple/remote/32791.c,"Heartbleed OpenSSL - Information Leak Exploit",2014-04-10,prdelka,multiple,remote,443 +32791,platforms/multiple/remote/32791.c,"Heartbleed OpenSSL - Information Leak Exploit (1)",2014-04-10,prdelka,multiple,remote,443 32792,platforms/php/webapps/32792.txt,"Orbit Open Ad Server 1.1.0 - SQL Injection",2014-04-10,"High-Tech Bridge SA",php,webapps,80 32793,platforms/windows/local/32793.rb,"MS14-017 Microsoft Word RTF Object Confusion",2014-04-10,metasploit,windows,local,0 32794,platforms/php/remote/32794.rb,"Vtiger Install Unauthenticated Remote Command Execution",2014-04-10,metasploit,php,remote,80 diff --git a/platforms/multiple/remote/32791.c b/platforms/multiple/remote/32791.c index 6c726cb82..c4b4223fa 100755 --- a/platforms/multiple/remote/32791.c +++ b/platforms/multiple/remote/32791.c @@ -12,7 +12,7 @@ * heartbeat SSL extension. All versions of OpenSSL 1.0.1 to * 1.0.1f are known affected. You must run this against a target * which is linked to a vulnerable OpenSSL library using DTLS/TLS. -* This exploit leaks upto 65532 bytes of remote heap each request +* This exploit leaks upto 65535 bytes of remote heap each request * and can be run in a loop until the connected peer ends connection. * The data leaked contains 16 bytes of random padding at the end. * The exploit can be used against a connecting client or server, @@ -619,7 +619,7 @@ int main(int argc, char* argv[]){ break; } } - if(ihost==0||iport==0||ifile==0||itype==0){ + if(ihost==0||iport==0||ifile==0||itype==0||type < 0){ printf("[ try --help\n"); exit(0); }