Skip to content

Commit 31eedbc

Browse files
author
Tod Beardsley
committed
Minor cleanups on recent modules
Edited modules/auxiliary/scanner/http/ms15_034_http_sys_memory_dump.rb first landed in rapid7#5577, MS15-034 HTTP.SYS Information Disclosure Edited modules/exploits/multi/browser/adobe_flash_shader_drawing_fill.rb first landed in rapid7#5605, CVE-2015-3105 flash exploit Edited modules/exploits/multi/browser/adobe_flash_shader_job_overflow.rb first landed in rapid7#5559, Adobe Flash Player ShaderJob Buffer Overflow Edited modules/auxiliary/test/report_auth_info.rb first landed in rapid7#5540, @wchen-r7's changes for multiple auxiliary modules to use the new cred API
1 parent eba1e24 commit 31eedbc

File tree

4 files changed

+13
-11
lines changed

4 files changed

+13
-11
lines changed

modules/auxiliary/scanner/http/ms15_034_http_sys_memory_dump.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'MS15-034 HTTP Protocol Stack Request Handling HTTP.SYS Memory Information Disclosure',
1717
'Description' => %q{
18-
Dumps memory contents using a crafted Range header. Affects only
18+
This module dumps memory contents using a crafted Range header, and affects only
1919
Windows 8.1, Server 2012, and Server 2012R2. Note that if the target
2020
is running in VMware Workstation, this module has a high likelihood
2121
of resulting in BSOD; however, VMware ESX and non-virtualized hosts

modules/exploits/multi/browser/adobe_flash_shader_drawing_fill.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,10 @@ def initialize(info={})
1616
'Description' => %q{
1717
This module exploits a memory corruption happening when applying a Shader as a drawing fill
1818
as exploited in the wild on June 2015. This module has been tested successfully on:
19-
Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.188.
20-
Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.188.
21-
Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.188.
19+
20+
Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.188,
21+
Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.188,
22+
Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.188, and
2223
Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.460.
2324
},
2425
'License' => MSF_LICENSE,

modules/exploits/multi/browser/adobe_flash_shader_job_overflow.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,11 @@ def initialize(info={})
2020
of the ShaderJob after starting the job it's possible to create a buffer overflow condition
2121
where the size of the destination buffer and the length of the copy are controlled. This
2222
module has been tested successfully on:
23-
* Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.169.
24-
* Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.169.
25-
* Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.169.
26-
* Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.457.
23+
24+
Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.169,
25+
Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.169,
26+
Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.169, and
27+
Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.457.
2728
},
2829
'License' => MSF_LICENSE,
2930
'Author' =>

test/modules/auxiliary/test/report_auth_info.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => "report_cred test",
17+
'Name' => "report_cred Test",
1818
'Description' => %q{
19-
This module will test every auxiliary module's report_cred method
19+
This module will test every auxiliary module's report_cred method
2020
},
2121
'Author' => [ 'sinn3r' ],
2222
'License' => MSF_LICENSE
@@ -119,7 +119,7 @@ def test_vmware_http_login
119119
end
120120

121121
def test_asterisk_login
122-
mod = framework.auxiliary.create('voip/asterisk_login')
122+
mod = framework.auxiliary.create('voip/asterisk_login')
123123
mod.report_cred(ip: FAKE_IP, port: FAKE_PORT, user: FAKE_USER, password: FAKE_PASS)
124124
end
125125

0 commit comments

Comments
 (0)