diff --git a/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb b/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb index 57aa221edb..388f388469 100644 --- a/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb +++ b/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb @@ -20,9 +20,9 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'CyberLink Power2Go name attribute (.p2g) Stack Buffer Overflow Exploit', 'Description' => %q{ - This module exploits a stack buffer overflow in Xion Audio Player prior to version - 1.0.126. The vulnerability is triggered when opening a malformed M3U file that - contains an overly long string. This results in overwriting a + This module exploits a stack buffer overflow in CyberLink Power2Go version 8.x + The vulnerability is triggered when opening a malformed p2g file containing an overly + long string in the 'name' attribute of the file element. This results in overwriting a structured exception handler record. }, 'License' => MSF_LICENSE,