Exploit Microsoft Office XP - Remote code Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
17399
Проверка EDB
  1. Пройдено
Автор
FRANCIS PROVENCHER
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
N/A
Дата публикации
2011-06-14
Код:
#####################################################################################

Application:   Microsoft Office XP Remote code Execution

Platforms:   Windows Vista

Exploitation:   Remote code execution

CVE Number:  

Microsoft Bulletin:

{PRL}:   2011-07

Author:   Francis Provencher (Protek Research Lab's)

WebSite:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch


#####################################################################################

1) Introduction
2) Report Timeline
3) Technical details
4) POC

#####################################################################################

===============
1) Introduction
===============

Microsoft Office is a proprietary commercial office suite of inter-related desktop

applications, servers and services for the Microsoft Windows and Mac OS X operating

systems, introduced by Microsoft in 1989. Initially a marketing term for a bundled

set of applications, the first version of Office contained Microsoft Word,

Microsoft Excel, and Microsoft PowerPoint. Over the years, Office applications have

grown substantially closer with shared features such as a common spell checker,

OLE data integration and Microsoft Visual Basic for Applications scripting language.

http://en.wikipedia.org/wiki/Microsoft_Office

#####################################################################################

============================
2) Report Timeline
============================

2011-01-03 - Vulnerability reported to vendor
2011-06-14 - Uncoordinated public release of advisory


#####################################################################################

====================
3) Technical details
====================

This vulnerability allows remote attackers to execute arbitrary code on vulnerable

installations of Microsoft Office Word. User interaction is required to exploit this

vulnerability in that the target must visit a malicious page or open a malicious file.

0:000> g
(c18.bf4): Access violation - code c0000005 (!!! second chance !!!)
eax=41424344 ebx=00000011 ecx=00000010 edx=00000001 esi=00000000 edi=41424344
eip=308eb16d esp=00125450 ebp=00125474 iopl=0         nv up ei pl zr na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010246
winword!wdGetApplicationObject+0x150fac:
308eb16d 8b07            mov     eax,dword ptr [edi]  ds:0023:41424344=????????


#####################################################################################

===========
4) POC
===========

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17399.doc (PRL-2011-07.doc)
http://www.protekresearchlab.com/exploits/PRL-2011-07.doc
 
Источник
www.exploit-db.com

Похожие темы