Skip to content

Commit

Permalink
Land rapid7#2772, more slight updates from @todb-r7
Browse files Browse the repository at this point in the history
  • Loading branch information
wvu committed Dec 16, 2013
2 parents afcee93 + f88a3a5 commit 1a051fd
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
6 changes: 3 additions & 3 deletions modules/exploits/windows/browser/adobe_toolbutton.rb
Original file line number Diff line number Diff line change
Expand Up @@ -17,9 +17,9 @@ def initialize(info={})
This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6
and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where
the cEnable callback can be used to early free the object memory. Later use of the object
allows to trigger the use after free condition. This module has been tested successfully
on Adobe Reader 11.0.2 and 10.0.4, with IE and Windows XP SP3, as exploited in the wild on
November 2013. At the moment this module doesn't support Adobe Reader 9 targets, in order
allows triggering the use after free condition. This module has been tested successfully
on Adobe Reader 11.0.2 and 10.0.4, with IE and Windows XP SP3, as exploited in the wild in
November, 2013. At the moment, this module doesn't support Adobe Reader 9 targets; in order
to exploit Adobe Reader 9 the fileformat version of the exploit can be used.
},
'License' => MSF_LICENSE,
Expand Down
8 changes: 4 additions & 4 deletions modules/exploits/windows/fileformat/adobe_toolbutton.rb
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,9 @@ def initialize(info = {})
This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6
and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where
the cEnable callback can be used to early free the object memory. Later use of the object
allows to trigger the use after free condition. This module has been tested successfully
on Adobe Reader 11.0.2, 10.0.4 and 9.5.0 on Windows XP SP3, as exploited in the wild on
November 2013.
allows triggering the use after free condition. This module has been tested successfully
on Adobe Reader 11.0.2, 10.0.4 and 9.5.0 on Windows XP SP3, as exploited in the wild in
November, 2013.
},
'License' => MSF_LICENSE,
'Author' =>
Expand Down Expand Up @@ -358,4 +358,4 @@ def make_pdf(js)
AcroRd32_60000000!DllCanUnloadNow+0x1493ae:
60197b9b ff9064030000 call dword ptr [eax+364h] ds:0023:0c0c0c0c=????????
=end
=end

0 comments on commit 1a051fd

Please sign in to comment.