Skip to content

Commit 309159d

Browse files
committed
Land rapid7#4753, updated ms14_070_tcpip_ioctl info
2 parents ab42bad + 8ab469d commit 309159d

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

modules/exploits/windows/local/ms14_070_tcpip_ioctl.rb

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ class Metasploit3 < Msf::Exploit::Local
1818

1919
def initialize(info={})
2020
super(update_info(info, {
21-
'Name' => 'Windows tcpip.sys Arbitrary Write Privilege Escalation',
21+
'Name' => 'Windows tcpip!SetAddrOptions NULL Pointer Dereference',
2222
'Description' => %q{
2323
A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys,
24-
can allow an attacker to inject controlled memory into an arbitrary
25-
location within the kernel.
24+
can allow an attacker to trigger a NULL pointer dereference by using a
25+
specially crafted IOCTL.
2626
},
2727
'License' => MSF_LICENSE,
2828
'Author' =>
@@ -51,6 +51,9 @@ def initialize(info={})
5151
'References' =>
5252
[
5353
['CVE', '2014-4076'],
54+
['MSB', 'MS14-070'],
55+
['OSVDB', '114532'],
56+
['URL', 'https://blog.korelogic.com/blog/2015/01/28/2k3_tcpip_setaddroptions_exploit_dev'],
5457
['URL', 'https://www.korelogic.com/Resources/Advisories/KL-001-2015-001.txt']
5558
],
5659
'DisclosureDate'=> 'Nov 11 2014',

0 commit comments

Comments
 (0)