Touching up Kernelsmith's wording.
It is merely the ROP chain, not the vuln, that requires Java.unstable
parent
883dc26d73
commit
a5ffe7297f
|
@ -27,13 +27,15 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
This module exploits a vulnerability found in Microsoft Internet Explorer (MSIE). When
|
||||
rendering an HTML page, the CMshtmlEd object gets deleted in an unexpected manner,
|
||||
but the same memory is reused again later in the CMshtmlEd::Exec() function, leading
|
||||
to a use-after-free condition. Please note that this vulnerability has
|
||||
been exploited in the wild since Sep 14 2012, and there is currently no official
|
||||
patch for it.
|
||||
to a use-after-free condition.
|
||||
|
||||
This module requires the following dependencies on the target for the ROP chain to function.
|
||||
For WinXP SP3 with IE8, msvcrt must be present (which it is on default installs). For
|
||||
Vista/Win7 with IE8 or Win7 with IE9, jre 1.6.x or below must be installed.
|
||||
Please note that this vulnerability has been exploited in the wild since Sep 14 2012,
|
||||
and there is currently no official patch for it.
|
||||
|
||||
Also note that presently, this module has some target dependencies for the ROP chain to be
|
||||
valid. For WinXP SP3 with IE8, msvcrt must be present (as it is by default).
|
||||
For Vista or Win7 with IE8, or Win7 with IE9, JRE 1.6.x or below must be installed (which
|
||||
is often the case).
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
|
Loading…
Reference in New Issue