Skip to content

Commit c1c5b0b

Browse files
committed
Land rapid7#4051, typo and grammar fixes
2 parents 2985b39 + 6812b8f commit c1c5b0b

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/windows/fileformat/ms14_060_sandworm.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,13 @@ def initialize(info={})
2525
2626
This module will generate three files: an INF, a GIF, and a PPSX file. You are required to
2727
set up a SMB or Samba 3 server and host the INF and GIF there. Systems such as Ubuntu or an
28-
older version of Winodws (such as XP) work best for this because they require little
28+
older version of Windows (such as XP) work best for this because they require little
2929
configuration to get going. The PPSX file is what you should send to your target.
3030
3131
In detail, the vulnerability has to do with how the Object Packager 2 component
3232
(packager.dll) handles an INF file that contains malicious registry changes, which may be
3333
leveraged for code execution. First of all, Packager does not load the INF file directly.
34-
But as an attacker, you can trick it to load your INF anyway by embedding the file path as
34+
As an attacker, you can trick it to load your INF anyway by embedding the file path as
3535
a remote share in an OLE object. The packager will then treat it as a type of media file,
3636
and load it with the packager!CPackage::OLE2MPlayerReadFromStream function, which will
3737
download it with a CopyFileW call, save it in a temp folder, and pass that information for

0 commit comments

Comments
 (0)