what you don't know can hurt you

Microsoft PowerPoint Viewer 12.0.6600.1000 DLL Hijacking

Microsoft PowerPoint Viewer 12.0.6600.1000 DLL Hijacking
Posted Mar 1, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft PowerPoint Viewer version 12.0.6600.1000 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
MD5 | 2a755f926620d3e0ed78fe4c04d77b9a

Microsoft PowerPoint Viewer 12.0.6600.1000 DLL Hijacking

Change Mirror Download
[+] Credits: hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source:
http://hyp3rlinx.altervista.org/advisories/MICROSOFT-PPT-VIEWER-CODE-EXEC.txt



Vendor:
===================
www.microsoft.com



Product:
============================
Microsoft PowerPoint Viewer
version: 12.0.6600.1000



Vulnerability Type:
====================================
DLL Hijack Arbitrary Code Execution



Vulnerability Details:
=====================

Microsoft PowerPoint Viewer 'POWERPNT.EXE' will execute arbitrary code if
an attacker can place a DLL named "api-ms-win-appmodel-runtime-l1-1-0.dll"
in users
downloads directory. This exploit does NOT rely on any embedded OLE objects
or CLSID registered COM objects in the document to execute.


1) create malicious DLL named "api-ms-win-appmodel-runtime-l1-1-0.dll"

2) place DLL in users downloads directory via download driveby etc...

3) open an existing .PPT document from the downloads directory e.g.
"C:\Users\Downloads\somefile.ppt"


then BOOOOOM ...


Tested on: Windows 7 SP1 x64



Disclosure Timeline:
=================================================================
Vendor Notification: February 23, 2016
vendor replies DLL side loading issue already publicly known.

a google search returned following results:

1) examples using embedded OLE objects and MS Word etc
2) old posts
3) examples not referencing "api-ms-win-appmodel-runtime-l1-1-0.dll" DLL

February 29, 2016 : Public Disclosure.



Severity Level:
================
High



Description:
============================================================

vulnerable DLL: "api-ms-win-appmodel-runtime-l1-1-0.dll"
Vulnerable Product: Microsoft PowerPoint Viewer 'POWERPNT.EXE'

============================================================

[+] Disclaimer
Permission is hereby granted for the redistribution of this advisory,
provided that it is not altered except by reformatting it, and that due
credit is given. Permission is explicitly given for insertion in
vulnerability databases and similar, provided that due credit is given to
the author.
The author is not responsible for any misuse of the information contained
herein and prohibits any malicious use of all security related information
or exploits by the author or elsewhere.

by hyp3rlinx

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close