Typo and grammar
This commit is contained in:
parent
2985b39267
commit
6812b8fa82
|
@ -25,13 +25,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
This module will generate three files: an INF, a GIF, and a PPSX file. You are required to
|
||||
set up a SMB or Samba 3 server and host the INF and GIF there. Systems such as Ubuntu or an
|
||||
older version of Winodws (such as XP) work best for this because they require little
|
||||
older version of Windows (such as XP) work best for this because they require little
|
||||
configuration to get going. The PPSX file is what you should send to your target.
|
||||
|
||||
In detail, the vulnerability has to do with how the Object Packager 2 component
|
||||
(packager.dll) handles an INF file that contains malicious registry changes, which may be
|
||||
leveraged for code execution. First of all, Packager does not load the INF file directly.
|
||||
But as an attacker, you can trick it to load your INF anyway by embedding the file path as
|
||||
As an attacker, you can trick it to load your INF anyway by embedding the file path as
|
||||
a remote share in an OLE object. The packager will then treat it as a type of media file,
|
||||
and load it with the packager!CPackage::OLE2MPlayerReadFromStream function, which will
|
||||
download it with a CopyFileW call, save it in a temp folder, and pass that information for
|
||||
|
|
Loading…
Reference in New Issue