Skip to content

Commit bb33a91

Browse files
committed
Update description to be a little more descriptive
1 parent cd02e61 commit bb33a91

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/windows/fileformat/iftp_schedule_bof.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a stack-based buffer overflow vulnerability in
1919
i-Ftp v2.20, caused by a long time value set for scheduled download.
20-
By persuading the victim to load a specially-crafted Schedule.xml file,
21-
a remote attacker could execute arbitrary code on the system or cause
22-
the application to crash. This module has been tested successfully on
23-
Windows XP SP3.
20+
By persuading the victim to place a specially-crafted Schedule.xml file
21+
in the i-FTP folder, a remote attacker could execute arbitrary code on
22+
the system or cause the application to crash. This module has been
23+
tested successfully on Windows XP SP3.
2424
},
2525
'License' => MSF_LICENSE,
2626
'Author' =>

0 commit comments

Comments
 (0)