add references, update description
git-svn-id: file:///home/svn/framework3/trunk@8471 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
f3c6b01bbd
commit
d561b8e8ec
|
@ -21,9 +21,15 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Microsoft Excel Malformed FEATHEADER Record Vulnerability',
|
||||
'Description' => %q{
|
||||
This module exploits a memory corruption vulnerability in the handling of the
|
||||
FEATHEADER record by Microsoft Excel. All versions prior to the MS09-067 patch
|
||||
are vulnerable.
|
||||
This module exploits a vulnerability in the handling of the FEATHEADER record
|
||||
by Microsoft Excel. Revisions of Office XP and later prior to the release of the
|
||||
MS09-067 bulletin are vulnerable.
|
||||
|
||||
When processing a FEATHEADER (Shared Feature) record, Microsoft used a data
|
||||
structure from the file to calculate a pointer offset without doing proper
|
||||
validation. Attacker supplied data is then used to calculate the location of an
|
||||
object, and in turn a virtual function call. This results in arbitrary code
|
||||
exection.
|
||||
|
||||
NOTE: On some versions of Office, the user will need to dismiss a warning dialog
|
||||
prior to the payload executing.
|
||||
|
@ -40,7 +46,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE','2009-3129' ],
|
||||
[ 'OSVDB', '59860' ],
|
||||
[ 'MSB', 'MS09-067' ],
|
||||
[ 'BID', '36945' ]
|
||||
[ 'BID', '36945' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-09-083/' ],
|
||||
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=832' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
Loading…
Reference in New Issue