automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-12-21 15:14:24 -08:00
parent b9742802aa
commit a457973702
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 4 additions and 3 deletions

View File

@ -54791,13 +54791,14 @@
"type": "exploit",
"author": [
"Jann Horn",
"Brendan Coles <bcoles@gmail.com>"
"Brendan Coles"
],
"description": "This module exploits a vulnerability in VMware Workstation Pro and\n Player on Linux which allows users to escalate their privileges by\n using an ALSA configuration file to load and execute a shared object\n as root when launching a virtual machine with an attached sound card.\n\n This module has been tested successfully on VMware Player version\n 12.5.0 on Debian Linux.",
"description": "This module exploits a vulnerability in VMware Workstation Pro and\n Player on Linux which allows users to escalate their privileges by\n using an ALSA configuration file to load and execute a shared object\n as root when launching a virtual machine with an attached sound card.\n\n This module has been tested successfully on VMware Player version\n 12.5.0 on Debian Linux 8 Jessie.",
"references": [
"CVE-2017-4915",
"EDB-42045",
"BID-98566",
"URL-https://www.securitytracker.com/id/1038525",
"URL-https://gist.github.com/bcoles/cd26a831473088afafefc93641e184a9",
"URL-https://www.vmware.com/security/advisories/VMSA-2017-0009.html",
"URL-https://bugs.chromium.org/p/project-zero/issues/detail?id=1142"
@ -54817,7 +54818,7 @@
"Linux x86",
"Linux x64"
],
"mod_time": "2018-10-10 14:12:29 +0000",
"mod_time": "2018-12-17 08:01:34 +0000",
"path": "/modules/exploits/linux/local/vmware_alsa_config.rb",
"is_install_path": true,
"ref_name": "linux/local/vmware_alsa_config",