This module exploits a vulnerability in Microsoft Office (.PPT files). The vulnerability is caused due to a boundary error in mso.dll within the processing of PPT files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Microsoft Office Groove is prone to a vulnerability that may allow execution of imm.dll if this dll is located in the same folder than .GRP file. The attacker must entice a victim into opening a specially crafted .GRP file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits an error during processing of FORMAT records when loading Excel files into memory that can be exploited to corrupt memory via a specially crafted XLS file containing an out-of-bounds array index. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.