This module exploits a memory corruption in Microsoft Office Powerpoint when parsing a .PPT document with a specially crafted msofbtOPT record type. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
A remote code execution vulnerability exists in the way that Microsoft Office Powerpoint handles specially crafted Powerpoint files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Microsoft Access contains a vulnerability in the way it handles compiled queries that are stored in .acdb files. It mistakenly interprets certain fields in the file as pointers and produce memory corruption. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a buffer overflow in the Microsoft Windows MPEG Layer-3 codecs when parsing a malformed .AVI file. This module runs a web server waiting for vulnerable clients (Internet Explorer 6 or 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module runs a web server waiting for vulnerable clients (Internet Explorer with a vulnerable RDS.Dataspace ActiveX Control) to connect to it. When the client connects, it will try to install an agent by sending a specially crafted HTML page which exploits the Microsoft MDAC RDS.Dataspace ActiveX Control Remote Code Execution Vulnerability.
This module exploits a vulnerability in Microsoft Jet Database (msjet40.dll) trough a Microsoft Access Document. The vulnerability is caused due to boundary error in msjet40.dll within the processing of MDB files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a vulnerability in Microsoft Jet Database (msjet40.dll) through a Microsoft Word document. The vulnerability is caused due to a boundary error in msjet40.dll within the processing of MDB files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.