/// File Name: |
evocam_webserver.rb.txt |
Description:
|
This Metasploit module exploits a stack overflow in the web server provided with the EvoCam program for Mac OS X. We use Dino Dai Zovi's exec-from-heap technique to copy the payload from the non-executable stack segment to heap memory. Vulnerable versions include 3.6.6, 3.6.7, and possibly earlier versions as well. EvoCam version 3.6.8 fixes the vulnerability.
| Author: | Alexey Sintsov,Paul Harrington | Homepage: | http://www.metasploit.com | File Size: | 3142 | Related OSVDB(s): | 65043 | Last Modified: | Jun 15 02:39:49 2010 |
MD5 Checksum: | 4033ff861ae532841e5dc2e1a0f0188d |
|