Vulnerability & Exploit Database

Back to search

Watermark Master Buffer Overflow (SEH)

This module exploits a stack based buffer overflow in Watermark Master 2.2.23 when processing a specially crafted .WCF file. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing a user of Watermark Master to open a malicious .WCF file.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/fileformat/watermark_master

Authors

  • metacom
  • Andrew Smith

References

Targets

  • Windows 7 x32 - Watermark Master 2.2.23
  • Windows 7 x64 - Watermark Master 2.2.23

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/fileformat/watermark_master msf exploit(watermark_master) > show targets ...targets... msf exploit(watermark_master) > set TARGET <target-id> msf exploit(watermark_master) > show options ...show and set options... msf exploit(watermark_master) > exploit