From 8f867b5b0d3381f4d07ba7398cc02e01a74e3d44 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Thu, 19 Jul 2012 10:12:22 -0500 Subject: [PATCH] 100 columns or each line in the description --- .../windows/novell/zenworks_preboot_op4c_bof.rb | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/modules/exploits/windows/novell/zenworks_preboot_op4c_bof.rb b/modules/exploits/windows/novell/zenworks_preboot_op4c_bof.rb index 5a08470e27..bdfe4680b6 100644 --- a/modules/exploits/windows/novell/zenworks_preboot_op4c_bof.rb +++ b/modules/exploits/windows/novell/zenworks_preboot_op4c_bof.rb @@ -17,11 +17,12 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'Novell ZENworks Configuration Management Preboot Service 0x4c Buffer Overflow', 'Description' => %q{ - This module exploits a remote buffer overflow in the ZENworks Configuration Management 10 SP2. - The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted - packet with the opcode 0x4c (PROXY_CMD_PREBOOT_TASK_INFO2) to port 998/TCP. The module has been - successfully tested on tested on Novell ZENworks Configuration Management 10 SP2 and Windows Server - 2003 SP2 (DEP bypass). + This module exploits a remote buffer overflow in the ZENworks Configuration + Management 10 SP2. The vulnerability exists in the Preboot service and can be + triggered by sending a specially crafted packet with the opcode 0x4c + (PROXY_CMD_PREBOOT_TASK_INFO2) to port 998/TCP. The module has been successfully + tested on tested on Novell ZENworks Configuration Management 10 SP2 and Windows + Server 2003 SP2 (DEP bypass). }, 'License' => MSF_LICENSE, 'Author' =>