module

DjVu DjVu_ActiveX_MSOffice.dll ActiveX ComponentBuffer Overflow

Disclosed
Oct 30, 2008
Created
May 30, 2018

Description

This module exploits a stack buffer overflow in DjVu ActiveX Component. When sending an
overly long string to the ImageURL() property of DjVu_ActiveX_MSOffice.dll (3.0)
an attacker may be able to execute arbitrary code. This control is not marked safe
for scripting, so choose your attack vector accordingly.

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/fileformat/djvu_imageurl
msf exploit(djvu_imageurl) > show targets
...targets...
msf exploit(djvu_imageurl) > set TARGET < target-id >
msf exploit(djvu_imageurl) > show options
...show and set options...
msf exploit(djvu_imageurl) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.