Description change again

git-svn-id: file:///home/svn/framework3/trunk@12371 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Wei Chen 2011-04-19 16:41:58 +00:00
parent 0d2cc7472b
commit 488c6de9df
1 changed files with 2 additions and 3 deletions

View File

@ -22,10 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{ 'Description' => %q{
This module exploits a stack buffer overflow in Wireshark <= 1.4.4 This module exploits a stack buffer overflow in Wireshark <= 1.4.4
When opening a malicious .pcap file in Wireshark, a stack buffer occurs, When opening a malicious .pcap file in Wireshark, a stack buffer occurs,
resulting in arbitrary code execution. This exploit bypasses DEP & ASLR and resulting in arbitrary code execution.
works on XP, Vista & Windows 7.
Note: To exploit the vulnerability remotely with Scapy: psend(rdpcap("file")) Note: To exploit the vulnerability remotely with Scapy: sendp(rdpcap("file"))
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>