Land #2824, @todb-r7's small fixes for recent modules
commit
165728cd40
|
@ -17,8 +17,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Name' => 'IBM Forms Viewer Unicode Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability
|
||||
is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed
|
||||
XFDL files, with a long fontname value. This module has been tested successfully on IBM
|
||||
is due to a dangerous usage of a strcpy-like function, and occurs while parsing malformed
|
||||
XFDL files containing a long fontname value. This module has been tested successfully on IBM
|
||||
Forms Viewer 4.0 on Windows XP SP3 and Windows 7 SP1.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits a stack-based buffer overflow vulnerability in version 2.1
|
||||
of IcoFX. The vulnerability exists while parsing .ICO files, where an specially
|
||||
crafted ICONDIR header, providing an arbitrary long number of images into the file,
|
||||
crafted ICONDIR header providing an arbitrary long number of images in the file
|
||||
can be used to trigger the overflow when reading the ICONDIRENTRY structures.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -63,7 +63,7 @@ class Metasploit3 < Msf::Post
|
|||
name = datastore['DRIVER_NAME'].blank? ? Rex::Text.rand_text_alpha((rand(8)+6)) : datastore['DRIVER_NAME']
|
||||
|
||||
unless is_admin?
|
||||
print_error("You don't have enough privileges. Try getsystem.")
|
||||
print_error("Administrator or better privileges needed. Try 'getsystem' first.")
|
||||
return
|
||||
end
|
||||
|
||||
|
|
Loading…
Reference in New Issue