Rapid7 Vulnerability & Exploit Database

Office OLE Multiple DLL Side Loading Vulnerabilities

Back to Search

Office OLE Multiple DLL Side Loading Vulnerabilities

Disclosed
12/08/2015
Created
05/30/2018

Description

Multiple DLL side loading vulnerabilities were found in various COM components. These issues can be exploited by loading various these components as an embedded OLE object. When instantiating a vulnerable object Windows will try to load one or more DLLs from the current working directory. If an attacker convinces the victim to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system.

Author(s)

  • Yorick Koster

Platform

Windows

Architectures

x86, x64

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/fileformat/office_ole_multiple_dll_hijack
msf exploit(office_ole_multiple_dll_hijack) > show targets
    ...targets...
msf exploit(office_ole_multiple_dll_hijack) > set TARGET < target-id >
msf exploit(office_ole_multiple_dll_hijack) > show options
    ...show and set options...
msf exploit(office_ole_multiple_dll_hijack) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;