modules/exploits/windows/browser/ms06_001_wmf_setabortproc.rb
Method initialize
has 44 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Windows XP/2003/Vista Metafile Escape() SetAbortProc Code Execution',
'Description' => %q{
This module exploits a vulnerability in the GDI library included with
Method generate_metafile
has 34 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def generate_metafile(payload)
# Minimal length values before and after the Escape record
pre_mlen = 1440 + rand(8192)
suf_mlen = 128 + rand(8192)