Typo and grammar

This commit is contained in:
Tod Beardsley 2014-10-20 11:02:09 -05:00
parent 2985b39267
commit 6812b8fa82
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
1 changed files with 2 additions and 2 deletions

View File

@ -25,13 +25,13 @@ class Metasploit3 < Msf::Exploit::Remote
This module will generate three files: an INF, a GIF, and a PPSX file. You are required to
set up a SMB or Samba 3 server and host the INF and GIF there. Systems such as Ubuntu or an
older version of Winodws (such as XP) work best for this because they require little
older version of Windows (such as XP) work best for this because they require little
configuration to get going. The PPSX file is what you should send to your target.
In detail, the vulnerability has to do with how the Object Packager 2 component
(packager.dll) handles an INF file that contains malicious registry changes, which may be
leveraged for code execution. First of all, Packager does not load the INF file directly.
But as an attacker, you can trick it to load your INF anyway by embedding the file path as
As an attacker, you can trick it to load your INF anyway by embedding the file path as
a remote share in an OLE object. The packager will then treat it as a type of media file,
and load it with the packager!CPackage::OLE2MPlayerReadFromStream function, which will
download it with a CopyFileW call, save it in a temp folder, and pass that information for