Skip to content

Commit b862d24

Browse files
committed
Land rapid7#5302, module title/ref updates
2 parents 013781f + c988447 commit b862d24

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

modules/exploits/windows/browser/adobe_flash_copy_pixels_to_byte_array.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info={})
1515
super(update_info(info,
16-
'Name' => 'Adobe Flash Player copyPixelsToByteArray Integer Overflow',
16+
'Name' => 'Adobe Flash Player copyPixelsToByteArray Method Integer Overflow',
1717
'Description' => %q{
1818
This module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs
1919
in the copyPixelsToByteArray method from the BitmapData object. The position field of the
2020
destination ByteArray can be used to cause an integer overflow and write contents out of
2121
the ByteArray buffer. This module has been tested successfully on Windows 7 SP1 (32-bit),
22-
IE 8 to IE 11 and Flash 14.0.0.176, 14.0.0.145 and 14.0.0.125.
22+
IE 8 to IE 11 and Flash 14.0.0.176, 14.0.0.145, and 14.0.0.125.
2323
},
2424
'License' => MSF_LICENSE,
2525
'Author' =>
@@ -32,6 +32,7 @@ def initialize(info={})
3232
'References' =>
3333
[
3434
['CVE', '2014-0556'],
35+
['OSVDB', '111110'],
3536
['URL', 'http://googleprojectzero.blogspot.com/2014/09/exploiting-cve-2014-0556-in-flash.html'],
3637
['URL', 'https://code.google.com/p/google-security-research/issues/detail?id=46'],
3738
['URL', 'http://hacklab.kr/cve-2014-0556-%EB%B6%84%EC%84%9D/'],

0 commit comments

Comments
 (0)