Microsoft Address Book wab32res DLL Hijacking Exploit

Microsoft Address Book is prone to a vulnerability that may allow execution of wab32res.dll if this dll is located in the same folder than .WAB file. The attacker must entice a victim into opening a specially crafted .WAB file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
Exploit Platform
Exploit Type
Product Name