Update description
parent
e52241bfe3
commit
70f8e8d306
|
@ -19,9 +19,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows
|
||||
Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be
|
||||
vulnerable. However, based on our testing, the most reliable setup is on Windows platforms
|
||||
running Office 2013. And please keep in mind that some other setups such as using Office
|
||||
2010 might be less stable, and sometimes may end up with a crash due to a failure in the
|
||||
CPackage::CreateTempFileName function.
|
||||
running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such
|
||||
as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to
|
||||
a failure in the CPackage::CreateTempFileName function.
|
||||
|
||||
This module will generate three files: an INF, a GIF, and a PPSX file. You are required to
|
||||
set up a SMB or Samba 3 server and host the INF and GIF there. Systems such as Ubuntu or an
|
||||
|
|
Loading…
Reference in New Issue