D
D
dimakovalenko2012-10-27 12:14:03
Word
dimakovalenko, 2012-10-27 12:14:03

Zero day in Microsoft Word?

Situation Three days ago, a message
appeared on seclab.ru about zero day in Microsoft Word. If you follow the link to the description of the vulnerability, you can find the PoC. Question Has this PoC executed some arbitrary code? I ask because the only thing I can achieve is a stable STATUS_STACK_OVERFLOW (0xc00000fd ). The instruction test [eax], eax, due to an error in the program, climbs beyond the boundaries of the buffer and the application crashes. And it's all. At the moment the application crashes, the stack structure is not broken, the stack frames are intact ... I still don’t see how all this can lead to the execution of arbitrary code. Did I look bad? Thanks in advance for your replies :)

Answer the question

In order to leave comments, you need to log in

2 answer(s)
E
egorinsk, 2012-10-27
@egorinsk

Often published exploits are intentionally bugged to make them inaccessible to script kiddis. Maybe this is the same case?

D
dimakovalenko, 2012-10-27
@dimakovalenko

Mmmm... I think I found something to cling to. It looks like the author of PoC loves multi-level puzzles :)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question