mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-10-29 18:07:27 +01:00
Add metadata
This commit is contained in:
parent
8f70ec8256
commit
de25a6c23c
@ -18,10 +18,12 @@ class Metasploit3 < Msf::Exploit::Local
|
||||
|
||||
def initialize(info={})
|
||||
super(update_info(info, {
|
||||
'Name' => 'Windows ...',
|
||||
'Name' => 'MS15-004 Microsoft Windows Font Driver Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module ...
|
||||
This module has been tested on vulnerable builds of Windows 8.1 x64.
|
||||
This module exploits a pool based buffer overflow in the atmfd.dll driver when parsing
|
||||
a malformed font. The vulnerability was exploited by the hacking team and disclosed on
|
||||
the july data leak. This module has been tested successfully on vulnerable builds of
|
||||
Windows 8.1 x64.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [
|
||||
@ -37,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Local
|
||||
'EXITFUNC' => 'thread',
|
||||
},
|
||||
'Targets' => [
|
||||
# win32k.sys 6.3.9600.17393 / ntoskrnl.exe 6.3.9600.17415 / atmfd 5.1.2.238 (Works)
|
||||
[ 'Windows 8.1 x64', { } ]
|
||||
],
|
||||
'Payload' => {
|
||||
@ -56,8 +59,6 @@ class Metasploit3 < Msf::Exploit::Local
|
||||
end
|
||||
|
||||
def check
|
||||
# Windows 8.1 (64-bit) / atmfd 5.1.2.238 (Works)
|
||||
|
||||
# Windows 8.1
|
||||
if sysinfo['OS'] !~ /Windows 8/i
|
||||
return Exploit::CheckCode::Unknown
|
||||
|
Loading…
Reference in New Issue
Block a user