diff --git a/modules/exploits/windows/misc/gimp_script_fu.rb b/modules/exploits/windows/misc/gimp_script_fu.rb index 2b159ebb78..6fb3a43ed0 100644 --- a/modules/exploits/windows/misc/gimp_script_fu.rb +++ b/modules/exploits/windows/misc/gimp_script_fu.rb @@ -16,12 +16,12 @@ class Metasploit3 < Msf::Exploit::Remote super(update_info(info, 'Name' => 'GIMP script-fu Server Buffer Overflow', 'Description' => %q{ - This module exploits a buffer overflow in the script-fu server + This module exploits a buffer overflow in the script-fu server component on GIMP <= 2.6.12. By sending a specially crafted packet, an attacker may be able to achieve remote code execution under the context of the user. - This module has been tested on GIMP for Windows from installers + This module has been tested on GIMP for Windows from installers provided by Jernej Simoncic. }, 'Author' => @@ -153,4 +153,4 @@ cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206 script_fu+0xc86d: 0040c86d ffd2 call edx {42424242} -=end \ No newline at end of file +=end