File tree Expand file tree Collapse file tree 1 file changed +8
-8
lines changed
modules/exploits/windows/fileformat Expand file tree Collapse file tree 1 file changed +8
-8
lines changed Original file line number Diff line number Diff line change @@ -16,15 +16,15 @@ class Metasploit3 < Msf::Exploit::Remote
16
16
17
17
def initialize ( info = { } )
18
18
super ( update_info ( info ,
19
- 'Name' => 'Cool PDF Image Stream Buffer Overflow' ,
20
- 'Description' => %q{
19
+ 'Name' => 'Cool PDF Image Stream Buffer Overflow' ,
20
+ 'Description' => %q{
21
21
This module exploits a stack buffer overflow in Cool PDF Reader prior to version
22
22
3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that
23
23
contains a specially crafted image stream. This module has been tested successfully
24
24
on Cool PDF 3.0.2.256 over Windows XP SP3 and Windows 7 SP1.
25
25
} ,
26
- 'License' => MSF_LICENSE ,
27
- 'Author' =>
26
+ 'License' => MSF_LICENSE ,
27
+ 'Author' =>
28
28
[
29
29
'Francis Provencher' , # Vulnerability discovery
30
30
'Chris Gabriel' , # Proof of concept
@@ -37,13 +37,13 @@ def initialize(info = {})
37
37
[ 'EDB' , '24463' ] ,
38
38
[ 'URL' , 'http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=70&Itemid=70' ]
39
39
] ,
40
- 'Payload' =>
40
+ 'Payload' =>
41
41
{
42
42
'Space' => 2000 ,
43
43
'DisableNops' => true
44
44
} ,
45
- 'Platform' => 'win' ,
46
- 'Targets' =>
45
+ 'Platform' => 'win' ,
46
+ 'Targets' =>
47
47
[
48
48
[ 'Cool PDF 3.0.2.256 / Windows 7 SP1 / Windows XP SP3' ,
49
49
{
@@ -53,7 +53,7 @@ def initialize(info = {})
53
53
]
54
54
] ,
55
55
'DisclosureDate' => 'Jan 18 2013' ,
56
- 'DefaultTarget' => 0 ) )
56
+ 'DefaultTarget' => 0 ) )
57
57
58
58
register_options (
59
59
[
You can’t perform that action at this time.
0 commit comments