updated description
git-svn-id: file:///home/svn/framework3/trunk@9090 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
879a92ffbf
commit
180ca93bbb
|
@ -30,11 +30,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
by Ruben Santamarta, an attacker can execute arbitrary code in the context of
|
||||
an unsuspecting browser user.
|
||||
|
||||
This vulnerability was originally discovered independently by both Ruben
|
||||
Santamarta and Tavis Ormandy.
|
||||
|
||||
Tavis reported that all versions since version 6 Update 10 "are believed to be
|
||||
affected by this vulnerability."
|
||||
This vulnerability was originally discovered independently by both Ruben
|
||||
Santamarta and Tavis Ormandy. Tavis reported that all versions since version
|
||||
6 Update 10 "are believed to be affected by this vulnerability."
|
||||
|
||||
In order for this module to work, it must be ran as root on a server that
|
||||
does not serve SMB. Additionally, the target host must have the WebClient
|
||||
service (WebDAV Mini-Redirector) enabled.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => 'jduck',
|
||||
|
|
Loading…
Reference in New Issue