From b139757021b5a12ffcacd950d2fd904fccceeb3d Mon Sep 17 00:00:00 2001 From: sinn3r Date: Sat, 12 Oct 2013 13:24:36 -0500 Subject: [PATCH] Correct a typo in description --- modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb b/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb index 06966c4ced..14ac6b5c34 100644 --- a/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb +++ b/modules/exploits/windows/browser/ms13_080_cdisplaypointer.rb @@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote of this freed memory will still be kept by CDoc::ScrollPointerIntoView, specifically after the CDoc::GetLineInfo call, because it is still trying to use that to update CDisplayPointer's position. When this invalid reference arrives in QIClassID, a crash - finally occurs due to accessing the freed memory. By controling this freed memory, it is + finally occurs due to accessing the freed memory. By controlling this freed memory, it is possible to achieve arbitrary code execution under the context of the user. }, 'License' => MSF_LICENSE,