whitespace

git-svn-id: file:///home/svn/framework3/trunk@11568 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2011-01-13 00:14:44 +00:00
parent 5145bd551d
commit 166b4d3250
1 changed files with 1 additions and 1 deletions

View File

@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
'Name' => 'Schelevator',
'Description' => %q{
This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet.
When processing task files, the Windows Task Scheduler only uses a CRC32
When processing task files, the Windows Task Scheduler only uses a CRC32
checksum to validate that the file has not been tampered with. Also, In a default
configuration, normal users can read and write the task files that they have
created. By modifying the task file and creating a CRC32 collision, an attacker