diff --git a/modules/exploits/windows/fileformat/openoffice_ole.rb b/modules/exploits/windows/fileformat/openoffice_ole.rb index 6ee8a83608..3cb40f3b2e 100644 --- a/modules/exploits/windows/fileformat/openoffice_ole.rb +++ b/modules/exploits/windows/fileformat/openoffice_ole.rb @@ -16,12 +16,12 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => "OpenOffice OLE Importer DocumentSummaryInformation Stream Handling Overflow", 'Description' => %q{ - This module exploits a vulnerability in OpenOffice 2.3.1 and 2.3.0 on Microsoft - Windows XP SP3. + This module exploits a vulnerability in OpenOffice 2.3.1 and 2.3.0 on + Microsoft Windows XP SP3. - By supplying a OLE file with a malformed DocumentSummaryInformation stream an attacker - can get the control of the execution flow. This results arbitrary code execution under - the context of the user. + By supplying a OLE file with a malformed DocumentSummaryInformation stream, an + attacker can gain control of the execution flow, which results arbitrary code + execution under the context of the user. }, 'License' => MSF_LICENSE, 'Author' =>