Skip to content

Commit 260257a

Browse files
committed
Land rapid7#7446, Update Capcom exploit module to support Windows 10
2 parents 6fb418d + 25238f1 commit 260257a

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/windows/local/capcom_sys_exec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ def initialize(info={})
2222
This module abuses the Capcom.sys kernel driver's function that allows for an
2323
arbitrary function to be executed in the kernel from user land. This function
2424
purposely disables SMEP prior to invoking a function given by the caller.
25-
This has been tested on Windows 7 x64.
25+
This has been tested on Windows 7, 8.1 and Windows 10 (x64).
2626
},
2727
'License' => MSF_LICENSE,
2828
'Author' => [
@@ -36,7 +36,7 @@ def initialize(info={})
3636
'EXITFUNC' => 'thread',
3737
},
3838
'Targets' => [
39-
[ 'Windows x64 (<= 8)', { 'Arch' => ARCH_X86_64 } ]
39+
[ 'Windows x64 (<= 10)', { 'Arch' => ARCH_X86_64 } ]
4040
],
4141
'Payload' => {
4242
'Space' => 4096,
@@ -51,7 +51,7 @@ def initialize(info={})
5151
end
5252

5353
def check
54-
if sysinfo['OS'] !~ /windows (7|8)/i
54+
if sysinfo['OS'] !~ /windows (7|8|10)/i
5555
return Exploit::CheckCode::Unknown
5656
end
5757

0 commit comments

Comments
 (0)