diff --git a/modules/exploits/windows/fileformat/ibm_forms_viewer_fontname.rb b/modules/exploits/windows/fileformat/ibm_forms_viewer_fontname.rb index f8783268b7..351a236e85 100644 --- a/modules/exploits/windows/fileformat/ibm_forms_viewer_fontname.rb +++ b/modules/exploits/windows/fileformat/ibm_forms_viewer_fontname.rb @@ -17,8 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'IBM Forms Viewer Unicode Buffer Overflow', 'Description' => %q{ This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability - is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed - XFDL files, with a long fontname value. This module has been tested successfully on IBM + is due to a dangerous usage of a strcpy-like function, and occurs while parsing malformed + XFDL files containing a long fontname value. This module has been tested successfully on IBM Forms Viewer 4.0 on Windows XP SP3 and Windows 7 SP1. }, 'License' => MSF_LICENSE, diff --git a/modules/exploits/windows/fileformat/icofx_bof.rb b/modules/exploits/windows/fileformat/icofx_bof.rb index 1def45cf42..514341266a 100644 --- a/modules/exploits/windows/fileformat/icofx_bof.rb +++ b/modules/exploits/windows/fileformat/icofx_bof.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a stack-based buffer overflow vulnerability in version 2.1 of IcoFX. The vulnerability exists while parsing .ICO files, where an specially - crafted ICONDIR header, providing an arbitrary long number of images into the file, + crafted ICONDIR header providing an arbitrary long number of images in the file can be used to trigger the overflow when reading the ICONDIRENTRY structures. }, 'License' => MSF_LICENSE, diff --git a/modules/post/windows/manage/driver_loader.rb b/modules/post/windows/manage/driver_loader.rb index 95c2fb7f98..7f32ab25fc 100644 --- a/modules/post/windows/manage/driver_loader.rb +++ b/modules/post/windows/manage/driver_loader.rb @@ -63,7 +63,7 @@ class Metasploit3 < Msf::Post name = datastore['DRIVER_NAME'].blank? ? Rex::Text.rand_text_alpha((rand(8)+6)) : datastore['DRIVER_NAME'] unless is_admin? - print_error("You don't have enough privileges. Try getsystem.") + print_error("Administrator or better privileges needed. Try 'getsystem' first.") return end