Description change again
git-svn-id: file:///home/svn/framework3/trunk@12371 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
0d2cc7472b
commit
488c6de9df
|
@ -22,10 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a stack buffer overflow in Wireshark <= 1.4.4
|
This module exploits a stack buffer overflow in Wireshark <= 1.4.4
|
||||||
When opening a malicious .pcap file in Wireshark, a stack buffer occurs,
|
When opening a malicious .pcap file in Wireshark, a stack buffer occurs,
|
||||||
resulting in arbitrary code execution. This exploit bypasses DEP & ASLR and
|
resulting in arbitrary code execution.
|
||||||
works on XP, Vista & Windows 7.
|
|
||||||
|
|
||||||
Note: To exploit the vulnerability remotely with Scapy: psend(rdpcap("file"))
|
Note: To exploit the vulnerability remotely with Scapy: sendp(rdpcap("file"))
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
Loading…
Reference in New Issue