fix msftidy warnings about towelroot module
parent
73435c6d1c
commit
f99ef5c0f5
|
@ -1,8 +1,6 @@
|
|||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com/
|
||||
# This module requires Metasploit: http://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
|
@ -16,7 +14,7 @@ class Metasploit4 < Msf::Exploit::Local
|
|||
|
||||
def initialize(info={})
|
||||
super( update_info( info, {
|
||||
'Name' => 'Android futex requeue kernel exploit',
|
||||
'Name' => 'Android Futex Requeue Kernel Exploit',
|
||||
'Description' => %q{
|
||||
This module exploits a bug in futex_requeue in the linux kernel.
|
||||
Any android phone with a kernel built before June 2014 should be vulnerable.
|
||||
|
@ -41,7 +39,8 @@ class Metasploit4 < Msf::Exploit::Local
|
|||
{
|
||||
'PAYLOAD' => 'android/meterpreter/reverse_tcp',
|
||||
},
|
||||
'DefaultTarget' => 0
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => "May 03 2014"
|
||||
}
|
||||
))
|
||||
|
||||
|
|
Loading…
Reference in New Issue