Skip to content

Commit 9b10cd5

Browse files
committed
Land rapid7#4755, @todb-r7's release fixes
2 parents 868bf4b + d7fa06d commit 9b10cd5

File tree

4 files changed

+22
-18
lines changed

4 files changed

+22
-18
lines changed

modules/exploits/android/local/futex_requeue.rb

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,17 @@ class Metasploit4 < Msf::Exploit::Local
1414

1515
def initialize(info={})
1616
super( update_info( info, {
17-
'Name' => 'Android Futex Requeue Kernel Exploit',
17+
'Name' => "Android 'Towelroot' Futex Requeue Kernel Exploit",
1818
'Description' => %q{
19-
This module exploits a bug in futex_requeue in the linux kernel.
20-
Any android phone with a kernel built before June 2014 should be vulnerable.
19+
This module exploits a bug in futex_requeue in the Linux kernel, using
20+
similiar techniques employed by the towelroot exploit. Any Android device
21+
with a kernel built before June 2014 is likely to be vulnerable.
2122
},
2223
'License' => MSF_LICENSE,
2324
'Author' => [
24-
'Pinkie Pie', #discovery
25-
'geohot', #towelroot
26-
'timwr' #metasploit module
25+
'Pinkie Pie', # discovery
26+
'geohot', # towelroot
27+
'timwr' # metasploit module
2728
],
2829
'References' =>
2930
[

modules/exploits/windows/local/ms14_070_tcpip_ioctl.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,12 @@ class Metasploit3 < Msf::Exploit::Local
1818

1919
def initialize(info={})
2020
super(update_info(info, {
21-
'Name' => 'Windows tcpip!SetAddrOptions NULL Pointer Dereference',
21+
'Name' => 'MS14-070 Windows tcpip!SetAddrOptions NULL Pointer Dereference',
2222
'Description' => %q{
23-
A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys,
24-
can allow an attacker to trigger a NULL pointer dereference by using a
25-
specially crafted IOCTL.
23+
A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys
24+
can allow a local attacker to trigger a NULL pointer dereference by using a
25+
specially crafted IOCTL. This flaw can be abused to elevate privileges to
26+
SYSTEM.
2627
},
2728
'License' => MSF_LICENSE,
2829
'Author' =>

modules/exploits/windows/misc/achat_bof.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Achat v0.150 beta7 Buffer Overflow',
16+
'Name' => 'Achat Unicode SEH Buffer Overflow',
1717
'Description' => %q{
18-
This module exploits an unicode SEH based stack buffer overflow in Achat v0.150. By
19-
sending a crafted message to the default port 9256 it's possible to overwrites the
20-
SEH handler. Even when the exploit is reliable it depends of timing since there are
18+
This module exploits a Unicode SEH buffer overflow in Achat. By
19+
sending a crafted message to the default port 9256/UDP, it's possible to overwrite the
20+
SEH handler. Even when the exploit is reliable, it depends on timing since there are
2121
two threads overflowing the stack in the same time. This module has been tested on
22-
Windows XP SP3 and Windows 7.
22+
Achat v0.150 running on Windows XP SP3 and Windows 7.
2323
},
2424
'Author' =>
2525
[

modules/post/windows/gather/file_from_raw_ntfs.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,11 @@ class Metasploit3 < Msf::Post
1414
def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Windows File Gather File from Raw NTFS',
17-
'Description' => %q(
18-
This module gathers a file using the raw NTFS device, bypassing some Windows restrictions
19-
such as open file with write lock. Can be used to retrieve files such as NTDS.dit.),
17+
'Description' => %q{
18+
This module gathers a file using the raw NTFS device, bypassing some Windows restrictions
19+
such as open file with write lock. Because it avoids the usual file locking issues, it can
20+
be used to retrieve files such as NTDS.dit.
21+
},
2022
'License' => 'MSF_LICENSE',
2123
'Platform' => ['win'],
2224
'SessionTypes' => ['meterpreter'],

0 commit comments

Comments
 (0)