Skip to content

Commit e78d08e

Browse files
author
Tod Beardsley
committed
Fix up titles, descriptions
1 parent 309159d commit e78d08e

File tree

4 files changed

+19
-16
lines changed

4 files changed

+19
-16
lines changed

modules/exploits/android/local/futex_requeue.rb

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,17 @@ class Metasploit4 < Msf::Exploit::Local
1414

1515
def initialize(info={})
1616
super( update_info( info, {
17-
'Name' => 'Android Futex Requeue Kernel Exploit',
17+
'Name' => "Android 'Towelroot' Futex Requeue Kernel Exploit",
1818
'Description' => %q{
19-
This module exploits a bug in futex_requeue in the linux kernel.
20-
Any android phone with a kernel built before June 2014 should be vulnerable.
19+
This module exploits a bug in futex_requeue in the Linux kernel, using
20+
similiar techniques employed by the towelroot exploit. Any Android device
21+
with a kernel built before June, 2014 is likely to be vulnerable.
2122
},
2223
'License' => MSF_LICENSE,
2324
'Author' => [
24-
'Pinkie Pie', #discovery
25-
'geohot', #towelroot
26-
'timwr' #metasploit module
25+
'Pinkie Pie', # discovery
26+
'geohot', # towelroot
27+
'timwr' # metasploit module
2728
],
2829
'References' =>
2930
[

modules/exploits/windows/local/ms14_070_tcpip_ioctl.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,12 @@ class Metasploit3 < Msf::Exploit::Local
1818

1919
def initialize(info={})
2020
super(update_info(info, {
21-
'Name' => 'Windows tcpip!SetAddrOptions NULL Pointer Dereference',
21+
'Name' => 'MS14-070 Windows tcpip!SetAddrOptions NULL Pointer Dereference',
2222
'Description' => %q{
23-
A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys,
24-
can allow an attacker to trigger a NULL pointer dereference by using a
25-
specially crafted IOCTL.
23+
A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys
24+
can allow a local attacker to trigger a NULL pointer dereference by using a
25+
specially crafted IOCTL. This flaw can be abused to elevate privileges to
26+
SYSTEM.
2627
},
2728
'License' => MSF_LICENSE,
2829
'Author' =>

modules/exploits/windows/misc/achat_bof.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Achat v0.150 beta7 Buffer Overflow',
16+
'Name' => 'Achat Stack Based Buffer Overflow',
1717
'Description' => %q{
18-
This module exploits an unicode SEH based stack buffer overflow in Achat v0.150. By
19-
sending a crafted message to the default port 9256 it's possible to overwrites the
20-
SEH handler. Even when the exploit is reliable it depends of timing since there are
18+
This module exploits a Unicode SEH based stack based buffer overflow in Achat. By
19+
sending a crafted message to the default port UDP/9256, it's possible to overwrite the
20+
SEH handler. Even when the exploit is reliable, it depends of timing since there are
2121
two threads overflowing the stack in the same time. This module has been tested on
22-
Windows XP SP3 and Windows 7.
22+
Achat v0.150 running on Windows XP SP3 and Windows 7.
2323
},
2424
'Author' =>
2525
[

modules/post/windows/gather/file_from_raw_ntfs.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ def initialize(info = {})
1616
'Name' => 'Windows File Gather File from Raw NTFS',
1717
'Description' => %q(
1818
This module gathers a file using the raw NTFS device, bypassing some Windows restrictions
19-
such as open file with write lock. Can be used to retrieve files such as NTDS.dit.),
19+
such as open file with write lock. Because it avoids the usual file locking issues, it can
20+
be used to retrieve files such as NTDS.dit.),
2021
'License' => 'MSF_LICENSE',
2122
'Platform' => ['win'],
2223
'SessionTypes' => ['meterpreter'],

0 commit comments

Comments
 (0)