Skip to content

Commit be6552d

Browse files
committed
Clarifying VMware priv esc via bash module name
1 parent e0fc30c commit be6552d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/osx/local/vmware_bash_function_root.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Local
1515

1616
def initialize(info={})
1717
super(update_info(info,
18-
'Name' => 'Mac OS X VMWare Fusion Root Privilege Escalation Exploit',
18+
'Name' => 'OS X VMWare Fusion Privilege Escalation via Bash Environment Code Injection',
1919
'Description' => %q{
2020
This abuses the bug in bash environment variables (CVE-2014-6271) to get
2121
a suid binary inside of VMWare Fusion to launch our payload as root.

0 commit comments

Comments
 (0)