From 50e36d3fb066dfacc27cb54964a97ff7ef625c9a Mon Sep 17 00:00:00 2001 From: Steven Seeley Date: Sat, 14 Apr 2012 17:57:22 +1000 Subject: [PATCH] cyberlink Power2Go name attribute stack buffer overflow --- modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb b/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb index cfaa933301..e1418c039b 100644 --- a/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb +++ b/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'CyberLink Power2Go name attribute (.p2g) Stack Buffer Overflow Exploit', + 'Name' => 'CyberLink Power2Go name attribute (p2g) Stack Buffer Overflow Exploit', 'Description' => %q{ This module exploits a stack buffer overflow in CyberLink Power2Go version 8.x The vulnerability is triggered when opening a malformed p2g file containing an overly