Microsoft Word RTF stack buffer overflow
In the previous two recipes, we focused completely on browser-based exploits. Now in this recipe, we will focus on another popular Windows tool called Microsoft Office. The RTF buffer overflow flaw exists in both 2010 and 2007 versions of the Office software pack. This vulnerability exists in the handling of pfragments
shape property within the Microsoft Word RTF parser. Let us understand this exploit in detail. I am assuming that we have already gained information about our target that it has Office pack installed on his system.
Getting ready
We will start with launching the msfconsole. The exploit we will be using in this recipe can be located at exploit/windows/fileformat/ms10_087_rtf_pfragments_bof
. The payload we will be using is windows/meterpreter/reverse_tcp
to get shell connectivity with the target machine.
How to do it...
The working process will again be similar to what we have seen so far in previous recipes. We will first set our exploit...