Skip to content

Commit 0c0d150

Browse files
committed
No tabs for these
1 parent 07a3f15 commit 0c0d150

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

modules/exploits/windows/fileformat/coolpdf_image_stream_bof.rb

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,15 +16,15 @@ class Metasploit3 < Msf::Exploit::Remote
1616

1717
def initialize(info = {})
1818
super(update_info(info,
19-
'Name' => 'Cool PDF Image Stream Buffer Overflow',
20-
'Description' => %q{
19+
'Name' => 'Cool PDF Image Stream Buffer Overflow',
20+
'Description' => %q{
2121
This module exploits a stack buffer overflow in Cool PDF Reader prior to version
2222
3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that
2323
contains a specially crafted image stream. This module has been tested successfully
2424
on Cool PDF 3.0.2.256 over Windows XP SP3 and Windows 7 SP1.
2525
},
26-
'License' => MSF_LICENSE,
27-
'Author' =>
26+
'License' => MSF_LICENSE,
27+
'Author' =>
2828
[
2929
'Francis Provencher', # Vulnerability discovery
3030
'Chris Gabriel', # Proof of concept
@@ -37,13 +37,13 @@ def initialize(info = {})
3737
[ 'EDB', '24463' ],
3838
[ 'URL', 'http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=70&Itemid=70' ]
3939
],
40-
'Payload' =>
40+
'Payload' =>
4141
{
4242
'Space' => 2000,
4343
'DisableNops' => true
4444
},
45-
'Platform' => 'win',
46-
'Targets' =>
45+
'Platform' => 'win',
46+
'Targets' =>
4747
[
4848
[ 'Cool PDF 3.0.2.256 / Windows 7 SP1 / Windows XP SP3',
4949
{
@@ -53,7 +53,7 @@ def initialize(info = {})
5353
]
5454
],
5555
'DisclosureDate' => 'Jan 18 2013',
56-
'DefaultTarget' => 0))
56+
'DefaultTarget' => 0))
5757

5858
register_options(
5959
[

0 commit comments

Comments
 (0)