File tree Expand file tree Collapse file tree
modules/auxiliary/scanner/dlsw Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -13,10 +13,10 @@ class Metasploit3 < Msf::Auxiliary
1313
1414 def initialize
1515 super (
16- 'Name' => 'Cisco DLSw Information Leak Scanner' ,
16+ 'Name' => 'Cisco DLSw Information Disclosure Scanner' ,
1717 'Description' => %q(
18- This module implements the DLSw information leak retrieval. There is
19- a bug in Cisco's DLSw implementation affecting 12.x and 15.x trains
18+ This module implements the DLSw information disclosure retrieval. There
19+ is a bug in Cisco's DLSw implementation affecting 12.x and 15.x trains
2020 that allows an unuthenticated remote attacker to retrieve the partial
2121 contents of packets traversing a Cisco router with DLSw configured
2222 and active.
@@ -55,7 +55,7 @@ def get_response(size = 72)
5555
5656 # Called when using check
5757 def check_host ( _ip )
58- print_status ( "#{ peer } : Checking for DLSw exposure " )
58+ print_status ( "#{ peer } : Checking for DLSw information disclosure (CVE-2014-7992) " )
5959 response = get_response
6060
6161 if response . blank?
@@ -72,7 +72,7 @@ def check_host(_ip)
7272 # TODO: check that response has something that truly indicates it is vulnerable
7373 # and not simply that it responded
7474 unless response [ 18 ..72 ] . scan ( /\x00 / ) . length == 54
75- print_good ( "#{ peer } : leaked #{ response . length } bytes" )
75+ print_good ( "#{ peer } : vulnerable to DLSw information disclosure; leaked #{ response . length } bytes" )
7676 report_vuln (
7777 host : rhost ,
7878 port : rport ,
You can’t perform that action at this time.
0 commit comments