Skip to content

Commit d89eda6

Browse files
author
Tod Beardsley
committed
Moar fixes, thanks @wvu-r7
See rapid7#4755
1 parent e78d08e commit d89eda6

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

modules/exploits/windows/misc/achat_bof.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Achat Stack Based Buffer Overflow',
16+
'Name' => 'Achat Unicode SEH Buffer Overflow',
1717
'Description' => %q{
18-
This module exploits a Unicode SEH based stack based buffer overflow in Achat. By
19-
sending a crafted message to the default port UDP/9256, it's possible to overwrite the
18+
This module exploits a Unicode SEH buffer overflow in Achat. By
19+
sending a crafted message to the default port 9256/UDP, it's possible to overwrite the
2020
SEH handler. Even when the exploit is reliable, it depends of timing since there are
2121
two threads overflowing the stack in the same time. This module has been tested on
2222
Achat v0.150 running on Windows XP SP3 and Windows 7.

modules/post/windows/gather/file_from_raw_ntfs.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,11 @@ class Metasploit3 < Msf::Post
1414
def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Windows File Gather File from Raw NTFS',
17-
'Description' => %q(
17+
'Description' => %q{
1818
This module gathers a file using the raw NTFS device, bypassing some Windows restrictions
1919
such as open file with write lock. Because it avoids the usual file locking issues, it can
20-
be used to retrieve files such as NTDS.dit.),
20+
be used to retrieve files such as NTDS.dit.
21+
},
2122
'License' => 'MSF_LICENSE',
2223
'Platform' => ['win'],
2324
'SessionTypes' => ['meterpreter'],

0 commit comments

Comments
 (0)