From 4b8f5dc41c619f93a82549af019841251f4eec67 Mon Sep 17 00:00:00 2001 From: Bastian Kanbach Date: Tue, 5 Sep 2023 13:15:36 +0200 Subject: [PATCH] Update modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb Corrected typo Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com> --- modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb b/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb index 0598e2bbc1d0..b6751f6cc986 100644 --- a/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb +++ b/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb @@ -18,7 +18,7 @@ def initialize(info = {}) 'Description' => %q{ This module checks the provided hosts for the CVE-2023-21554 vulnerability by sending a MSMQ message with an altered DataLength field within the SRMPEnvelopeHeader that - overflows the given buffer. On patched systems, the error is catched and no response + overflows the given buffer. On patched systems, the error is caught and no response is sent back. On vulnerable systems, the integer wraps around and depending on the length could cause an out-of-bounds write. In the context of this module a response is sent back, which indicates that the system is vulnerable.