Skip to content

Commit 70f8e8d

Browse files
committed
Update description
1 parent e52241b commit 70f8e8d

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/windows/fileformat/ms14_060_sandworm.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ def initialize(info={})
1919
allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows
2020
Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be
2121
vulnerable. However, based on our testing, the most reliable setup is on Windows platforms
22-
running Office 2013. And please keep in mind that some other setups such as using Office
23-
2010 might be less stable, and sometimes may end up with a crash due to a failure in the
24-
CPackage::CreateTempFileName function.
22+
running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such
23+
as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to
24+
a failure in the CPackage::CreateTempFileName function.
2525
2626
This module will generate three files: an INF, a GIF, and a PPSX file. You are required to
2727
set up a SMB or Samba 3 server and host the INF and GIF there. Systems such as Ubuntu or an

0 commit comments

Comments
 (0)