Skip to content

Commit

Permalink
Update Microsoft patch information
Browse files Browse the repository at this point in the history
  • Loading branch information
wchen-r7 committed Dec 13, 2013
1 parent f3ce1c1 commit ba1a70b
Showing 1 changed file with 3 additions and 1 deletion.
4 changes: 3 additions & 1 deletion modules/exploits/windows/fileformat/mswin_tiff_overflow.rb
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote

def initialize(info={})
super(update_info(info,
'Name' => "Microsoft Tagged Image File Format (TIFF) Integer Overflow",
'Name' => "MS13-096 Microsoft Tagged Image File Format (TIFF) Integer Overflow",
'Description' => %q{
This module exploits a vulnerability found in Microsoft's Tagged Image File Format.
It was originally discovered in the wild, targeting Windows XP and Windows Server 2003
Expand Down Expand Up @@ -61,6 +61,8 @@ def initialize(info={})
'References' =>
[
[ 'CVE', '2013-3906' ],
[ 'MSB', 'MS13-096' ],
[ 'OSVDB', '99376' ],
[ 'URL', 'http://technet.microsoft.com/en-us/security/advisory/2896666' ],
[ 'URL', 'http://blogs.technet.com/b/srd/archive/2013/11/05/cve-2013-3906-a-graphics-vulnerability-exploited-through-word-documents.aspx' ]
],
Expand Down

0 comments on commit ba1a70b

Please sign in to comment.