Older targets confirmed for CoolType SING

This commit is contained in:
Tod Beardsley
2012-09-12 16:51:46 -05:00
parent fba219532c
commit 39f2cbfc3c
2 changed files with 3 additions and 1 deletions
@@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => 'Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow',
'Description' => %q{
This module exploits a vulnerability in the Smart INdependent Glyplets (SING) table
handling within versions 8.2.4 and 9.3.4 of Adobe Reader. Prior version are
handling within versions 8.2.4 and 9.3.4 of Adobe Reader. Prior versions are
assumed to be vulnerable as well.
},
'License' => MSF_LICENSE,
@@ -59,6 +59,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
# Tested OK via Adobe Reader 9.3.4 on Windows XP SP3 -jjd
# Tested OK via Adobe Reader 9.3.4 on Windows 7 -jjd
# Tested OK via Adobe Reader 9.3 on XP and 7 -todb
[ 'Automatic', { }],
],
'DisclosureDate' => 'Sep 07 2010',
@@ -58,6 +58,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
# Tested OK via Adobe Reader 9.3.4 on Windows XP SP3 -jjd
# Tested OK via Adobe Reader 9.3.4 on Windows 7 -jjd
# Tested OK via Adobe Reader 9.3 on XP and 7 -todb
[ 'Automatic', { }],
],
'DisclosureDate' => 'Sep 07 2010',