Get a Pentest and security assessment of your IT network.

News

Ongoing analysis of unknown exploit targeting Office 2007-2013 UTAI MS15-022

An unknown RTF exploit sample has a far greater impact than most traditional memory corruption exploits targeting MS Office. Successful exploitation seems to be possible on all currently supported versions of MS Office up and including the MS15-022 patch. The exploit sample analyzed in this blog post is an RTF file which contains 4 embedded objects. Each object has its own role in one of the stages of exploitation like: loading a non-aslr module, spraying the heap or triggering the vulnerability. A known technique is being used to bypass ASLR, making it possible to use hardcoded addresses of ROP gadgets.”]

Source: https://blog.ropchain.com/2015/08/16/analysis-of-exploit-targeting-office-2007-2013-ms15-022/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months