Description change again
git-svn-id: file:///home/svn/framework3/trunk@12371 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
0d2cc7472b
commit
488c6de9df
|
@ -22,10 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Wireshark <= 1.4.4
|
||||
When opening a malicious .pcap file in Wireshark, a stack buffer occurs,
|
||||
resulting in arbitrary code execution. This exploit bypasses DEP & ASLR and
|
||||
works on XP, Vista & Windows 7.
|
||||
resulting in arbitrary code execution.
|
||||
|
||||
Note: To exploit the vulnerability remotely with Scapy: psend(rdpcap("file"))
|
||||
Note: To exploit the vulnerability remotely with Scapy: sendp(rdpcap("file"))
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
Loading…
Reference in New Issue