From 8817c0eee096b0d2c8089707770345c975ca8b50 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Thu, 28 Nov 2013 12:19:42 -0600 Subject: [PATCH] Change description a bit Try to make this sound smoother --- modules/exploits/windows/scada/abb_wserver_exec.rb | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/modules/exploits/windows/scada/abb_wserver_exec.rb b/modules/exploits/windows/scada/abb_wserver_exec.rb index 66212e350b..11e7f5701a 100644 --- a/modules/exploits/windows/scada/abb_wserver_exec.rb +++ b/modules/exploits/windows/scada/abb_wserver_exec.rb @@ -16,11 +16,12 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'ABB MicroSCADA wserver.exe Remote Code Execution', 'Description' => %q{ This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The - vulnerability exists on the wserver.exe component, disabled by default but required when - a project uses the SCIL function WORKSTATION_CALL. The issue exists on the handling of - EXECUTE operations, which allows unauthenticated execution of arbitrary commands. This - module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over Windows XP SP3 - and Windows 7 SP1. + issue is due to the handling of unauthenticated EXECUTE operations on the wserver.exe + component, which allows arbitrary commands. The component is disabled by default, but + required when a project uses the SCIL function WORKSTATION_CALL. + + This module has been tested successfully on ABB MicroSCADA Pro SYS600 9.3 over + Windows XP SP3 and Windows 7 SP1. }, 'License' => MSF_LICENSE, 'Author' =>