From 9ab62de637ceb176fc7a43b2e015d1a610884c64 Mon Sep 17 00:00:00 2001 From: sinn3r Date: Mon, 3 Sep 2012 01:44:02 -0500 Subject: [PATCH] Fix a spelling error --- modules/exploits/windows/misc/sap_netweaver_dispatcher.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/misc/sap_netweaver_dispatcher.rb b/modules/exploits/windows/misc/sap_netweaver_dispatcher.rb index d155385014..5ac7c7d2f3 100644 --- a/modules/exploits/windows/misc/sap_netweaver_dispatcher.rb +++ b/modules/exploits/windows/misc/sap_netweaver_dispatcher.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote service. The overflow occurs in the DiagTraceR3Info() function and allows a remote attacker to execute arbitrary code by supplying a special crafted Diag packet. The Dispatcher service is only vulnerable if the Developer Traces have been configured - at levels 2 or 3. The module has been succesfully tested on SAP Netweaver 7.0 EHP2 + at levels 2 or 3. The module has been successfully tested on SAP Netweaver 7.0 EHP2 SP6 over Windows XP SP3 and Windows 2003 SP2 (DEP bypass). }, 'Author' => [