From a1eb09066493356fb165fee8db3413a4f5528fea Mon Sep 17 00:00:00 2001 From: djalal Date: Sun, 26 Jun 2011 19:01:09 +0000 Subject: [PATCH] Changed the script argument 'smtp-vuln-cve2010-4344.command' to 'smtp-vuln-cve2010-4344.cmd' for consistency reasons. --- scripts/smtp-vuln-cve2010-4344.nse | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/scripts/smtp-vuln-cve2010-4344.nse b/scripts/smtp-vuln-cve2010-4344.nse index 001ca81c3..18be34ac9 100644 --- a/scripts/smtp-vuln-cve2010-4344.nse +++ b/scripts/smtp-vuln-cve2010-4344.nse @@ -12,9 +12,9 @@ file using the -C option (CVE-2010-4345). The smtp-vuln-cve2010-4344.exploit script argument will make the script try to exploit the vulnerabilties, by sending more than 50MB of data, it depends on the message size limit configuration option of the -Exim server. If the exploit succeed the exploit.command or -smtp-vuln-cve2010-4344.command script arguments can be used -to run an arbitrary command on the remote system, under the +Exim server. If the exploit succeed the exploit.cmd or +smtp-vuln-cve2010-4344.cmd script arguments can be used to +run an arbitrary command on the remote system, under the Exim user privileges. If this script argument is set then it will enable the smtp-vuln-cve2010-4344.exploit argument. @@ -32,7 +32,7 @@ Reference: --- -- @usage -- nmap --script=smtp-vuln-cve2010-4344 --script-args="smtp-vuln-cve2010-4344.exploit" -pT:25,465,587 --- nmap --script=smtp-vuln-cve2010-4344 --script-args="exploit.command='uname -a'" -pT:25,465,587 +-- nmap --script=smtp-vuln-cve2010-4344 --script-args="exploit.cmd='uname -a'" -pT:25,465,587 -- -- @output -- PORT STATE SERVICE @@ -53,9 +53,9 @@ Reference: -- be used. -- @args smtp-vuln-cve2010-4344.mailto Define the destination email address -- to be used. --- @args exploit.command or smtp-vuln-cve2010-4344.command An arbitrary --- command to run under the Exim user privileges on the --- remote system. If this argument is set then, it will enable the +-- @args exploit.cmd or smtp-vuln-cve2010-4344.cmd An arbitrary command to +-- run under the Exim user privileges on the remote +-- system. If this argument is set then, it will enable the -- smtp-vuln-cve2010-4344.exploit argument. author = "Djalal Harouni" @@ -453,8 +453,8 @@ action = function(host, port) mailfrom = stdnse.get_script_args('smtp-vuln-cve2010-4344.mailfrom'), mailto = stdnse.get_script_args('smtp-vuln-cve2010-4344.mailto'), exploit = stdnse.get_script_args('smtp-vuln-cve2010-4344.exploit'), - shell_cmd = stdnse.get_script_args('exploit.command') or - stdnse.get_script_args('smtp-vuln-cve2010-4344.command'), + shell_cmd = stdnse.get_script_args('exploit.cmd') or + stdnse.get_script_args('smtp-vuln-cve2010-4344.cmd'), } if smtp_opts.shell_cmd then smtp_opts.exploit = true