diff --git a/modules/exploits/windows/fileformat/wireshark_packet_dect.rb b/modules/exploits/windows/fileformat/wireshark_packet_dect.rb index 14d64fc032..9bb6512b79 100644 --- a/modules/exploits/windows/fileformat/wireshark_packet_dect.rb +++ b/modules/exploits/windows/fileformat/wireshark_packet_dect.rb @@ -22,10 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a stack buffer overflow in Wireshark <= 1.4.4 When opening a malicious .pcap file in Wireshark, a stack buffer occurs, - resulting in arbitrary code execution. This exploit bypasses DEP & ASLR and - works on XP, Vista & Windows 7. + resulting in arbitrary code execution. - Note: To exploit the vulnerability remotely with Scapy: psend(rdpcap("file")) + Note: To exploit the vulnerability remotely with Scapy: sendp(rdpcap("file")) }, 'License' => MSF_LICENSE, 'Author' =>