whitespace
git-svn-id: file:///home/svn/framework3/trunk@11568 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
5145bd551d
commit
166b4d3250
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Post
|
|||
'Name' => 'Schelevator',
|
||||
'Description' => %q{
|
||||
This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet.
|
||||
When processing task files, the Windows Task Scheduler only uses a CRC32
|
||||
When processing task files, the Windows Task Scheduler only uses a CRC32
|
||||
checksum to validate that the file has not been tampered with. Also, In a default
|
||||
configuration, normal users can read and write the task files that they have
|
||||
created. By modifying the task file and creating a CRC32 collision, an attacker
|
||||
|
|
Loading…
Reference in New Issue