Add another ref about the technique
parent
a8ea014f25
commit
54146b8e99
|
@ -31,10 +31,14 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
of these unexpected paths, sometimes escalate privileges if run as SYSTEM.
|
||||
Some softwares such as OpenVPN 2.1.1, or OpenSSH Server 5, etc... all have the
|
||||
same problem.
|
||||
|
||||
The offensive technique is also described in Writing Secure Code (2nd Edition),
|
||||
Chapter 23, in the section "Calling Processes Security" on page 676.
|
||||
},
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://msdn.microsoft.com/en-us/library/windows/desktop/ms682425(v=vs.85).aspx']
|
||||
['URL', 'http://msdn.microsoft.com/en-us/library/windows/desktop/ms682425(v=vs.85).aspx'],
|
||||
['URL', 'http://www.microsoft.com/learning/en/us/book.aspx?id=5957&locale=en-us'] #pg 676
|
||||
],
|
||||
'DisclosureDate' => "Oct 25 2001",
|
||||
'License' => MSF_LICENSE,
|
||||
|
@ -136,7 +140,7 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
print_error("Unable to start #{svr_name}")
|
||||
return
|
||||
else
|
||||
tried = true
|
||||
tried = true
|
||||
end
|
||||
|
||||
case s.message
|
||||
|
|
Loading…
Reference in New Issue