File tree Expand file tree Collapse file tree 1 file changed +8
-8
lines changed
modules/exploits/windows/fileformat Expand file tree Collapse file tree 1 file changed +8
-8
lines changed Original file line number Diff line number Diff line change @@ -16,15 +16,15 @@ class Metasploit3 < Msf::Exploit::Remote
1616
1717 def initialize ( info = { } )
1818 super ( update_info ( info ,
19- 'Name' => 'Cool PDF Image Stream Buffer Overflow' ,
20- 'Description' => %q{
19+ 'Name' => 'Cool PDF Image Stream Buffer Overflow' ,
20+ 'Description' => %q{
2121 This module exploits a stack buffer overflow in Cool PDF Reader prior to version
2222 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that
2323 contains a specially crafted image stream. This module has been tested successfully
2424 on Cool PDF 3.0.2.256 over Windows XP SP3 and Windows 7 SP1.
2525 } ,
26- 'License' => MSF_LICENSE ,
27- 'Author' =>
26+ 'License' => MSF_LICENSE ,
27+ 'Author' =>
2828 [
2929 'Francis Provencher' , # Vulnerability discovery
3030 'Chris Gabriel' , # Proof of concept
@@ -37,13 +37,13 @@ def initialize(info = {})
3737 [ 'EDB' , '24463' ] ,
3838 [ 'URL' , 'http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=70&Itemid=70' ]
3939 ] ,
40- 'Payload' =>
40+ 'Payload' =>
4141 {
4242 'Space' => 2000 ,
4343 'DisableNops' => true
4444 } ,
45- 'Platform' => 'win' ,
46- 'Targets' =>
45+ 'Platform' => 'win' ,
46+ 'Targets' =>
4747 [
4848 [ 'Cool PDF 3.0.2.256 / Windows 7 SP1 / Windows XP SP3' ,
4949 {
@@ -53,7 +53,7 @@ def initialize(info = {})
5353 ]
5454 ] ,
5555 'DisclosureDate' => 'Jan 18 2013' ,
56- 'DefaultTarget' => 0 ) )
56+ 'DefaultTarget' => 0 ) )
5757
5858 register_options (
5959 [
You can’t perform that action at this time.
0 commit comments