Rapid7 Vulnerability & Exploit Database

MS10-087 Microsoft Word RTF pFragments Stack Buffer Overflow (File Format)

Back to Search

MS10-087 Microsoft Word RTF pFragments Stack Buffer Overflow (File Format)

Disclosed
11/09/2010
Created
05/30/2018

Description

This module exploits a stack-based buffer overflow in the handling of the 'pFragments' shape property within the Microsoft Word RTF parser. All versions of Microsoft Office 2010, 2007, 2003, and XP prior to the release of the MS10-087 bulletin are vulnerable. This module does not attempt to exploit the vulnerability via Microsoft Outlook. The Microsoft Word RTF parser was only used by default in versions of Microsoft Word itself prior to Office 2007. With the release of Office 2007, Microsoft began using the Word RTF parser, by default, to handle rich-text messages within Outlook as well. It was possible to configure Outlook 2003 and earlier to use the Microsoft Word engine too, but it was not a default setting. It appears as though Microsoft Office 2000 is not vulnerable. It is unlikely that Microsoft will confirm or deny this since Office 2000 has reached its support cycle end-of-life.

Author(s)

  • wushi of team509
  • unknown
  • jduck <jduck@metasploit.com>
  • DJ Manila Ice, Vesh, CA

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/fileformat/ms10_087_rtf_pfragments_bof
msf exploit(ms10_087_rtf_pfragments_bof) > show targets
    ...targets...
msf exploit(ms10_087_rtf_pfragments_bof) > set TARGET < target-id >
msf exploit(ms10_087_rtf_pfragments_bof) > show options
    ...show and set options...
msf exploit(ms10_087_rtf_pfragments_bof) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;