Skip to content

Commit 1a051fd

Browse files
committed
Land rapid7#2772, more slight updates from @todb-r7
2 parents afcee93 + f88a3a5 commit 1a051fd

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

modules/exploits/windows/browser/adobe_toolbutton.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ def initialize(info={})
1717
This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6
1818
and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where
1919
the cEnable callback can be used to early free the object memory. Later use of the object
20-
allows to trigger the use after free condition. This module has been tested successfully
21-
on Adobe Reader 11.0.2 and 10.0.4, with IE and Windows XP SP3, as exploited in the wild on
22-
November 2013. At the moment this module doesn't support Adobe Reader 9 targets, in order
20+
allows triggering the use after free condition. This module has been tested successfully
21+
on Adobe Reader 11.0.2 and 10.0.4, with IE and Windows XP SP3, as exploited in the wild in
22+
November, 2013. At the moment, this module doesn't support Adobe Reader 9 targets; in order
2323
to exploit Adobe Reader 9 the fileformat version of the exploit can be used.
2424
},
2525
'License' => MSF_LICENSE,

modules/exploits/windows/fileformat/adobe_toolbutton.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ def initialize(info = {})
1818
This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6
1919
and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where
2020
the cEnable callback can be used to early free the object memory. Later use of the object
21-
allows to trigger the use after free condition. This module has been tested successfully
22-
on Adobe Reader 11.0.2, 10.0.4 and 9.5.0 on Windows XP SP3, as exploited in the wild on
23-
November 2013.
21+
allows triggering the use after free condition. This module has been tested successfully
22+
on Adobe Reader 11.0.2, 10.0.4 and 9.5.0 on Windows XP SP3, as exploited in the wild in
23+
November, 2013.
2424
},
2525
'License' => MSF_LICENSE,
2626
'Author' =>
@@ -358,4 +358,4 @@ def make_pdf(js)
358358
AcroRd32_60000000!DllCanUnloadNow+0x1493ae:
359359
60197b9b ff9064030000 call dword ptr [eax+364h] ds:0023:0c0c0c0c=????????
360360
361-
=end
361+
=end

0 commit comments

Comments
 (0)