注册 登录  
 加关注
   显示下一条  |  关闭
温馨提示!由于新浪微博认证机制调整,您的新浪微博帐号绑定已过期,请重新绑定!立即重新绑定新浪微博》  |  关闭

K8拉登哥哥's Blog

K8搞基大队[K8team] 信息安全 网络安全 0day漏洞 渗透测试 黑客

 
 
 

日志

 
 

[0day]Microsoft PPT 代码执行漏洞  

2016-04-19 17:06:57|  分类: 0day漏洞 |  标签: |举报 |字号 订阅

  下载LOFTER 我的照片书  |
[+] Credits: hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source:  http://hyp3rlinx.altervista.org/advisories/MICROSOFT-PPT-VIEWER-CODE-EXEC.txt



Vendor:
===================
www.microsoft.com



Product:
============================
Microsoft PowerPoint Viewer
version: 12.0.6600.1000



Vulnerability Type:
====================================
DLL Hijack Arbitrary Code Execution



Vulnerability Details:
=====================

Microsoft PowerPoint Viewer 'POWERPNT.EXE' will execute arbitrary code if an attacker can place a DLL named "api-ms-win-appmodel-runtime-l1-1-0.dll" in users
downloads directory. This exploit does NOT rely on any embedded OLE objects or CLSID registered COM objects in the document to execute. 


1) create malicious DLL named "api-ms-win-appmodel-runtime-l1-1-0.dll"

2) place DLL in users downloads directory via download driveby etc...

3) open an existing .PPT document from the downloads directory e.g. "C:UsersDownloadssomefile.ppt"


then BOOOOOM ...


Tested on: Windows 7 SP1 x64



Disclosure Timeline:
=================================================================
Vendor Notification:  February 23, 2016
vendor replies DLL side loading issue already publicly known.

a google search returned following results:

1) examples using embedded OLE objects and MS Word etc
2) old posts
3) examples not referencing "api-ms-win-appmodel-runtime-l1-1-0.dll" DLL

February 29, 2016  : Public Disclosure.



Severity Level:
================
High



Description:
============================================================

vulnerable DLL: "api-ms-win-appmodel-runtime-l1-1-0.dll"
Vulnerable Product:  Microsoft PowerPoint Viewer 'POWERPNT.EXE'

============================================================

[+] Disclaimer
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author.
The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere.

by hyp3rlinx
  评论这张
 
阅读(1404)| 评论(0)
推荐 转载

历史上的今天

在LOFTER的更多文章

评论

<#--最新日志,群博日志--> <#--推荐日志--> <#--引用记录--> <#--博主推荐--> <#--随机阅读--> <#--首页推荐--> <#--历史上的今天--> <#--被推荐日志--> <#--上一篇,下一篇--> <#-- 热度 --> <#-- 网易新闻广告 --> <#--右边模块结构--> <#--评论模块结构--> <#--引用模块结构--> <#--博主发起的投票-->
 
 
 
 
 
 
 
 
 
 
 
 
 
 

页脚

网易公司版权所有 ©1997-2016