File tree Expand file tree Collapse file tree 1 file changed +3
-4
lines changed
modules/exploits/windows/local Expand file tree Collapse file tree 1 file changed +3
-4
lines changed Original file line number Diff line number Diff line change @@ -21,8 +21,8 @@ def initialize(info={})
21
21
'Name' => 'Windows ClientCopyImage Win32k Exploit' ,
22
22
'Description' => %q{
23
23
This module exploits improper object handling in the win32k.sys kernel mode driver.
24
- This module has been tested on vulnerable builds of Windows 7 x64 and x86. The
25
- exploit should also work on earlier builds of windows.
24
+ This module has been tested on vulnerable builds of Windows 7 x64 and x86, and
25
+ Windows 2008 R2 SP1 x64. The exploit should also work on earlier builds of windows.
26
26
} ,
27
27
'License' => MSF_LICENSE ,
28
28
'Author' => [
@@ -44,8 +44,7 @@ def initialize(info={})
44
44
'Space' => 4096 ,
45
45
'DisableNops' => true
46
46
} ,
47
- 'References' =>
48
- [
47
+ 'References' => [
49
48
[ 'CVE' , '2015-1701' ] ,
50
49
[ 'MSB' , 'MS15-051' ] ,
51
50
[ 'URL' , 'https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html' ] ,
You can’t perform that action at this time.
0 commit comments