From f622a3a0e5c112d03497d290d8b1f2f810e9673e Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 17 Jun 2014 17:56:26 -0500 Subject: [PATCH] Fix typo --- modules/exploits/windows/http/ericom_access_now_bof.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/ericom_access_now_bof.rb b/modules/exploits/windows/http/ericom_access_now_bof.rb index ab2f23012b..5a0b29c3b7 100644 --- a/modules/exploits/windows/http/ericom_access_now_bof.rb +++ b/modules/exploits/windows/http/ericom_access_now_bof.rb @@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'Ericom AccessNow Server Buffer Overflow', 'Description' => %q{ This module exploits a stack based buffer overflow in Ericom AccessNow Server. The - vulnerability is due to an insecure usage of vsprintf with used controlled data, + vulnerability is due to an insecure usage of vsprintf with user controlled data, which can be triggered with a malformed HTTP request. This module has been tested successfully with Ericom AccessNow Server 2.4.0.2 on Windows XP SP3 and Windows 2003 Server SP2.