This bug is now patched
parent
4af75ff7ed
commit
06974cbc43
|
@ -25,7 +25,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => "Microsoft XML Core Services MSXML Uninitialized Memory Corruption",
|
||||
'Name' => "MS12-043 Microsoft XML Core Services MSXML Uninitialized Memory Corruption",
|
||||
'Description' => %q{
|
||||
This module exploits a memory corruption flaw in Microsoft XML Core Services
|
||||
when trying to access an uninitialized Node with the getDefinition API, which
|
||||
|
@ -44,6 +44,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2012-1889' ],
|
||||
[ 'BID', '53934' ],
|
||||
[ 'OSVDB', '82873'],
|
||||
[ 'MSB', 'MS12-043'],
|
||||
[ 'URL', 'http://technet.microsoft.com/en-us/security/advisory/2719615' ],
|
||||
[ 'URL', 'http://www.zdnet.com/blog/security/state-sponsored-attackers-using-ie-zero-day-to-hijack-gmail-accounts/12462' ],
|
||||
[ 'URL', 'http://hi.baidu.com/inking26/blog/item/9c2ab11c4784e5aa86d6b6c1.html' ]
|
||||
|
|
Loading…
Reference in New Issue