Skip to content

Commit

Permalink
Decaps Siemens (consistent with other modules)
Browse files Browse the repository at this point in the history
  • Loading branch information
Tod Beardsley committed Oct 7, 2013
1 parent 293927a commit 219bef4
Showing 1 changed file with 3 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -26,9 +26,9 @@ class Metasploit3 < Msf::Exploit::Remote

def initialize(info={})
super(update_info(info,
'Name' => "SIEMENS Solid Edge ST4 SEListCtrlX ActiveX Remote Code Execution",
'Name' => "Siemens Solid Edge ST4 SEListCtrlX ActiveX Remote Code Execution",
'Description' => %q{
This module exploits the SEListCtrlX ActiveX installed with the SIEMENS Solid Edge product.
This module exploits the SEListCtrlX ActiveX installed with the Siemens Solid Edge product.
The vulnerability exists on several APIs provided by the control, where user supplied input
is handled as a memory pointer without proper validation, allowing an attacker to read and
corrupt memory from the target process. This module abuses the methods NumChildren() and
Expand Down Expand Up @@ -497,4 +497,4 @@ def on_request_uri(cli, request)
send_response(cli, html, {'Content-Type'=>'text/html'})
end

end
end

0 comments on commit 219bef4

Please sign in to comment.