updated description

git-svn-id: file:///home/svn/framework3/trunk@9090 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-04-16 00:31:03 +00:00
parent 879a92ffbf
commit 180ca93bbb
1 changed files with 7 additions and 5 deletions

View File

@ -30,11 +30,13 @@ class Metasploit3 < Msf::Exploit::Remote
by Ruben Santamarta, an attacker can execute arbitrary code in the context of
an unsuspecting browser user.
This vulnerability was originally discovered independently by both Ruben
Santamarta and Tavis Ormandy.
Tavis reported that all versions since version 6 Update 10 "are believed to be
affected by this vulnerability."
This vulnerability was originally discovered independently by both Ruben
Santamarta and Tavis Ormandy. Tavis reported that all versions since version
6 Update 10 "are believed to be affected by this vulnerability."
In order for this module to work, it must be ran as root on a server that
does not serve SMB. Additionally, the target host must have the WebClient
service (WebDAV Mini-Redirector) enabled.
},
'License' => MSF_LICENSE,
'Author' => 'jduck',