From 166b4d3250368aadb0b3cf7ad6e512819078abf6 Mon Sep 17 00:00:00 2001 From: Joshua Drake Date: Thu, 13 Jan 2011 00:14:44 +0000 Subject: [PATCH] whitespace git-svn-id: file:///home/svn/framework3/trunk@11568 4d416f70-5f16-0410-b530-b9f4589650da --- modules/post/windows/escalate/schelevator.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/post/windows/escalate/schelevator.rb b/modules/post/windows/escalate/schelevator.rb index 49b9da04f0..372e0dedd6 100644 --- a/modules/post/windows/escalate/schelevator.rb +++ b/modules/post/windows/escalate/schelevator.rb @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post 'Name' => 'Schelevator', 'Description' => %q{ This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet. - When processing task files, the Windows Task Scheduler only uses a CRC32 + When processing task files, the Windows Task Scheduler only uses a CRC32 checksum to validate that the file has not been tampered with. Also, In a default configuration, normal users can read and write the task files that they have created. By modifying the task file and creating a CRC32 collision, an attacker