File tree Expand file tree Collapse file tree 1 file changed +4
-3
lines changed
modules/exploits/osx/local Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change @@ -28,10 +28,10 @@ class Metasploit3 < Msf::Exploit::Local
28
28
29
29
def initialize ( info = { } )
30
30
super ( update_info ( info ,
31
- 'Name' => 'Mac OS 10.8-10.8.4 Sudo Password Bypass' ,
31
+ 'Name' => 'Mac OS X Sudo Password Bypass' ,
32
32
'Description' => %q{
33
33
Gains a session with root permissions on versions of OS X with
34
- sudo binary vulnerable to CVE-2013-1775. Works on Mac OS 10.8 -10.8.4,
34
+ sudo binary vulnerable to CVE-2013-1775. Tested working on Mac OS 10.7 -10.8.4,
35
35
and possibly lower versions.
36
36
37
37
If your session belongs to a user with Administrative Privileges
@@ -46,7 +46,8 @@ def initialize(info={})
46
46
'Author' =>
47
47
[
48
48
'Todd C. Miller' , # Vulnerability discovery
49
- 'joev <jvennix[at]rapid7.com>' # Metasploit module
49
+ 'joev <jvennix[at]rapid7.com>' , # Metasploit module
50
+ 'juan vazquez' # testing/fixing module bugs
50
51
] ,
51
52
'References' =>
52
53
[
You can’t perform that action at this time.
0 commit comments