Update the description/refs
git-svn-id: file:///home/svn/framework3/trunk@11284 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
61e8ab1432
commit
8ad08ec535
|
@ -46,8 +46,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
An additional vulnerability, CVE-2010-4345, was also used in the attack that
|
An additional vulnerability, CVE-2010-4345, was also used in the attack that
|
||||||
led to the discovery of danger of this bug. This bug allows a local user to
|
led to the discovery of danger of this bug. This bug allows a local user to
|
||||||
gain root privileges from the Exim user account. We are not currently
|
gain root privileges from the Exim user account. If the Perl interpreter is
|
||||||
utilizing that bug within this module.
|
found on the remote system, this module will automatically exploit the
|
||||||
|
secondary bug as well to get root.
|
||||||
},
|
},
|
||||||
'Author' => [ 'jduck' ],
|
'Author' => [ 'jduck' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
@ -55,6 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'CVE', '2010-4344' ],
|
[ 'CVE', '2010-4344' ],
|
||||||
|
[ 'CVE', '2010-4345' ],
|
||||||
[ 'OSVDB', '69685' ],
|
[ 'OSVDB', '69685' ],
|
||||||
# [ 'BID', '' ],
|
# [ 'BID', '' ],
|
||||||
# [ 'URL', '' ],
|
# [ 'URL', '' ],
|
||||||
|
|
Loading…
Reference in New Issue