diff --git a/modules/exploits/windows/misc/ms07_064_sami.rb b/modules/exploits/windows/misc/ms07_064_sami.rb index 6d87de07cd..3dbc254072 100644 --- a/modules/exploits/windows/misc/ms07_064_sami.rb +++ b/modules/exploits/windows/misc/ms07_064_sami.rb @@ -19,9 +19,9 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'Microsoft DirectX DirectShow SAMI Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in the DirectShow Synchronized - Accessible Media Interchanged (SAMI) parser in quartz.dll. This module - has only been tested with Windows Media Player (6.4.09.1129) and - DirectX 8.0. + Accessible Media Interchanged (SAMI) parser in quartz.dll. This module + has only been tested with Windows Media Player (6.4.09.1129) and + DirectX 8.0. }, 'Author' => 'MC', 'License' => MSF_LICENSE, @@ -51,11 +51,6 @@ class Metasploit3 < Msf::Exploit::Remote 'Privileged' => false, 'DisclosureDate' => 'Dec 11 2007', 'DefaultTarget' => 0)) - - register_options( - [ - OptPort.new('SRVPORT', [ true, "The daemon port to listen on", 8080 ]) - ], self.class) end def on_client_connect(client)