Skip to content

Commit da4b572

Browse files
committed
Change module name
1 parent 3eccc12 commit da4b572

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

modules/exploits/windows/local/vbox_guest.rb renamed to modules/exploits/windows/local/virtual_box_guest_additions.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,11 @@ def initialize(info={})
2020
super(update_info(info, {
2121
'Name' => 'VirtualBox Guest Additions VBoxGuest.sys Privilege Escalation',
2222
'Description' => %q{
23-
A vulnerability within VBoxGuest module allows an attacker to inject memory they control
24-
into an arbitrary location they define. This can be used by an attacker to overwrite
25-
HalDispatchTable+0x4 and execute arbitrary code by subsequently calling
26-
NtQueryIntervalProfile. This has been tested on VBoxGuest Additions up to 4.3.10r93012.
23+
A vulnerability within the VBoxGuest driver allows an attacker to inject memory they
24+
control into an arbitrary location they define. This can be used by an attacker to
25+
overwrite HalDispatchTable+0x4 and execute arbitrary code by subsequently calling
26+
NtQueryIntervalProfile on Windows XP SP3 systems. This has been tested with VBoxGuest
27+
Additions up to 4.3.10r93012.
2728
},
2829
'License' => MSF_LICENSE,
2930
'Author' =>

0 commit comments

Comments
 (0)