File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
modules/exploits/windows/misc Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -19,8 +19,8 @@ def initialize(info = {})
19
19
'Description' => %q{
20
20
This module exploits a stack buffer overflow in HP Data Protector 4.0 SP1. The
21
21
overflow occurs during the login process, in the DtbClsLogin function provided by
22
- the dpwindtb.dll component, where the Utf8Cpy (strcpy like function) is used in a
23
- insecure way with the username. Successful exploitation will lead to code execution
22
+ the dpwindtb.dll component, where the Utf8Cpy (strcpy like function) is used in an
23
+ insecure way with the username. A successful exploitation will lead to code execution
24
24
with the privileges of the "dpwinsdr.exe" (HP Data Protector Express Domain Server
25
25
Service) process, which runs as SYSTEM by default.
26
26
} ,
@@ -114,7 +114,7 @@ def exploit
114
114
hello_response = sock . get
115
115
116
116
if not hello_response or hello_response . empty?
117
- print_error ( "#{ sock . peerinfo } - The Hello Request haven 't had response" )
117
+ print_error ( "#{ sock . peerinfo } - The Hello Request hasn 't received a response" )
118
118
return
119
119
end
120
120
You can’t perform that action at this time.
0 commit comments