From c463bd7c6dfb7739e4b04b0d5a899296f3af7ba3 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Thu, 31 May 2012 16:37:35 -0500 Subject: [PATCH] Fixing description for citrix module --- .../exploits/windows/misc/citrix_streamprocess_get_footer.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/windows/misc/citrix_streamprocess_get_footer.rb b/modules/exploits/windows/misc/citrix_streamprocess_get_footer.rb index 03d84ba3ba..004e550e1e 100644 --- a/modules/exploits/windows/misc/citrix_streamprocess_get_footer.rb +++ b/modules/exploits/windows/misc/citrix_streamprocess_get_footer.rb @@ -18,8 +18,8 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode - 0x40020002 (GetFooterRequest) to the 6905/UDP port. The module, which allows to execute - code under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 + 0x40020002 (GetFooterRequest) to the 6905/UDP port. The module, which allows code execution + under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3. }, 'License' => MSF_LICENSE,