@@ -15,8 +15,8 @@ class Metasploit3 < Msf::Exploit::Remote
15
15
16
16
def initialize ( info = { } )
17
17
super ( update_info ( info ,
18
- 'Name' => 'RealPlayer File Handling Buffer Overflow' ,
19
- 'Description' => %q{
18
+ 'Name' => 'RealPlayer File Handling Buffer Overflow' ,
19
+ 'Description' => %q{
20
20
This module exploits a stack based buffer overflow on RealPlayer <=15.0.6.14.
21
21
The vulnerability exists in the handling of real media files, due to the insecure
22
22
usage of the GetPrivateProfileString function to retrieve the URL property from an
@@ -26,12 +26,12 @@ def initialize(info = {})
26
26
drag and drop or double click methods. It has been tested successfully on Windows
27
27
XP SP3 with RealPlayer 15.0.5.109.
28
28
} ,
29
- 'License' => MSF_LICENSE ,
30
- 'Author' =>
29
+ 'License' => MSF_LICENSE ,
30
+ 'Author' =>
31
31
[
32
32
'suto <suto[at]vnsecurity.net>' # Vulnerability discovery, metasploit module
33
33
] ,
34
- 'References' =>
34
+ 'References' =>
35
35
[
36
36
[ 'CVE' , '2012-5691' ] ,
37
37
[ 'OSVDB' , '88486' ] ,
@@ -42,14 +42,14 @@ def initialize(info = {})
42
42
{
43
43
'ExitFunction' => 'process'
44
44
} ,
45
- 'Platform' => 'win' ,
46
- 'Payload' =>
45
+ 'Platform' => 'win' ,
46
+ 'Payload' =>
47
47
{
48
48
'BadChars' => "\x00 \x0a \x0d " ,
49
49
'DisableNops' => true ,
50
50
'Space' => 2000
51
51
} ,
52
- 'Targets' =>
52
+ 'Targets' =>
53
53
[
54
54
[ 'Windows XP SP3 / Real Player 15.0.5.109' ,
55
55
{
@@ -59,9 +59,9 @@ def initialize(info = {})
59
59
}
60
60
]
61
61
] ,
62
- 'Privileged' => false ,
62
+ 'Privileged' => false ,
63
63
'DisclosureDate' => 'Dec 14 2012' ,
64
- 'DefaultTarget' => 0 ) )
64
+ 'DefaultTarget' => 0 ) )
65
65
66
66
register_options ( [ OptString . new ( 'FILENAME' , [ false , 'The file name.' , 'msf.rm' ] ) , ] , self . class )
67
67
0 commit comments