forked from p15670423/monkey
docs: Update MS08-067.md
This commit is contained in:
parent
f7d9df0e64
commit
77859b86dd
|
@ -5,6 +5,10 @@ draft: false
|
||||||
tags: ["exploit", "windows"]
|
tags: ["exploit", "windows"]
|
||||||
---
|
---
|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
[MS08-067](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067) is a remote code execution vulnerability.
|
[MS08-067](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067) is a remote code execution vulnerability.
|
||||||
|
|
||||||
This exploiter is unsafe. If an exploit attempt fails, this could also lead to a crash in Svchost.exe. If the crash in Svchost.exe occurs, the Server service will be affected. That might cause system crash due to the use of buffer overflow. It's therefore **not** enabled by default.
|
This exploiter is unsafe. It's therefore **not** enabled by default.
|
||||||
|
|
||||||
|
If an exploit attempt fails, this could also lead to a crash in Svchost.exe. If a crash in Svchost.exe occurs, the server service will be affected. This may cause a system crash due to the use of buffer overflow.
|
||||||
|
|
Loading…
Reference in New Issue