Skip to content

Commit 9634f97

Browse files
author
zerosum0x0
committed
fix msftidy
1 parent fa79339 commit 9634f97

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

modules/exploits/windows/smb/ms17_010_eternalblue.rb

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,14 @@ class MetasploitModule < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'MS17-010 EternalBlue SMBv1/SMBv2 Kernel Pool Corruption',
16+
'Name' => 'MS17-010 EternalBlue SMB Remote Kernel Pool Corruption',
1717
'Description' => %q{
1818
This module is a port of the Equation Group ETERNALBLUE exploit, part of
1919
the FuzzBunch toolkit released by Shadow Brokers.
2020
2121
There is a buffer overflow memmove operation in Srv!SrvOs2FeaToNt. The size
22-
is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a
23-
DWORD is subtracted into a WORD. The kernel pool is groomed so that overflow
22+
is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a
23+
DWORD is subtracted into a WORD. The kernel pool is groomed so that overflow
2424
is well laid-out to overwrite an SMBv1 buffer. Actual RIP hijack is later
2525
completed in srvnet!SrvNetWskReceiveComplete.
2626
@@ -73,7 +73,7 @@ def initialize(info = {})
7373
],
7474
],
7575
'DefaultTarget' => 0,
76-
'DisclosureDate' => 'March 14, 2017'
76+
'DisclosureDate' => 'Mar 14 2017'
7777
))
7878

7979
register_options(
@@ -123,9 +123,9 @@ def exploit
123123
::Rex::ConnectionRefused => e
124124
print_bad("#{e.class}: #{e.message}")
125125
rescue => error
126-
puts error.class
127-
puts error.message
128-
puts error.backtrace
126+
print_bad(error.class)
127+
print_bad(error.message)
128+
print_bad(error.backtrace)
129129
ensure
130130
# pass
131131
end
@@ -686,4 +686,3 @@ def make_kernel_shellcode
686686
end
687687

688688
end
689-

0 commit comments

Comments
 (0)