Land #2824, @todb-r7's small fixes for recent modules

bug/bundler_fix
jvazquez-r7 2014-01-03 16:57:26 -06:00
commit 165728cd40
No known key found for this signature in database
GPG Key ID: 38D99152B9352D83
3 changed files with 4 additions and 4 deletions

View File

@ -17,8 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'IBM Forms Viewer Unicode Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability
is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed
XFDL files, with a long fontname value. This module has been tested successfully on IBM
is due to a dangerous usage of a strcpy-like function, and occurs while parsing malformed
XFDL files containing a long fontname value. This module has been tested successfully on IBM
Forms Viewer 4.0 on Windows XP SP3 and Windows 7 SP1.
},
'License' => MSF_LICENSE,

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
This module exploits a stack-based buffer overflow vulnerability in version 2.1
of IcoFX. The vulnerability exists while parsing .ICO files, where an specially
crafted ICONDIR header, providing an arbitrary long number of images into the file,
crafted ICONDIR header providing an arbitrary long number of images in the file
can be used to trigger the overflow when reading the ICONDIRENTRY structures.
},
'License' => MSF_LICENSE,

View File

@ -63,7 +63,7 @@ class Metasploit3 < Msf::Post
name = datastore['DRIVER_NAME'].blank? ? Rex::Text.rand_text_alpha((rand(8)+6)) : datastore['DRIVER_NAME']
unless is_admin?
print_error("You don't have enough privileges. Try getsystem.")
print_error("Administrator or better privileges needed. Try 'getsystem' first.")
return
end