carlosgprado / office-exploit-case-study

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

office-exploit-case-study

Most samples are malware used in the real world,please study them in virtual machine.Take responsibility yourself if you use them for illegal purposes.Samples should match hash in corresponding paper if mentioned.Exploits before 2012 not included.Feel free to open issues if you have any questions.

What did Microsoft do to make office more secure?

1.Data Execution Prevention in Office 2010

2.enforce ASLR randomization natively without any additional setting on Win7 and above, even for those DLLs not originally compiled with /DYNAMICBASE flag in Office 2013

3.disable EPS in 2017.4's patch

4.disable DDE in 2017.12's patch

CVE Type of Vuln fix time
CVE-2012-0158 stack overflow in ActiveX 2012.4
CVE-2012-1856 use after free in ActiveX 2012.8
CVE-2013-3906 array out of bounds in TIFF parser 2013.12
CVE-2014-1761 array out of bounds in RTF parser 2014.4
CVE-2014-4114 logic false in handling OLE object 2014.10
CVE-2014-6352(patch bypass of CVE-2014-4114) logic false in handling OLE object 2014.11
CVE-2015-0097 logic false in security zone 2015.3
CVE-2015-1641 type confusion in RTF parser 2015.4
CVE-2015-2545 use after free in EPS parser 2015.9
CVE-2016-7193 array out of bounds in RTF parser 2016.10
CVE-2017-0199 logic false in Office Moniker 2017.4
CVE-2017-0261 use after free in EPS parser 2017.5
CVE-2017-0262 type confusion in EPS parser 2017.5
CVE-2017-8570(patch bypass of CVE-2017-0199) logic false in Office Moniker 2017.7
CVE-2017-8759 logic false in .NET Framework 2017.9
CVE-2017-11826 type confusion in OOXML parser 2017.10
CVE-2017-11882 stack overflow in EQNEDT32.EXE 2017.11
CVE-2018-0802 stack overflow in EQNEDT32.EXE 2018.1

tools:

offvis

oletools

olefileview

010editor template

papers:

Attacking Interoperability An OLE Edition

https://www.blackhat.com/docs/us-15/materials/us-15-Li-Attacking-Interoperability-An-OLE-Edition.pdf

Persisting with Microsoft Office:Abusing Extensibility Options

https://labs.mwrinfosecurity.com/assets/BlogFiles/WilliamKnowles-MWR-44con-PersistingWithMicrosoftOffice.pdf

Analysis of the Attack Surface of Microsoft Office from a User's Perspective

https://sites.google.com/site/zerodayresearch/Analysis_of_the_Attack_Surface_of_Microsoft_Office_from_User_Perspective_final.pdf

About


Languages

Language:Visual Basic 100.0%