header-logo
Suggest Exploit
vendor:
Word
by:
halsten
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Word
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Mac
2016

MSFT Word 0day POC

A proof-of-concept (PoC) exploit for a buffer overflow vulnerability in Microsoft Word has been released. The exploit is triggered by forcing Word to recover a document, and then triggering the bug in three ways: Save, Close/Save, and change format.

Mitigation:

Microsoft has released a patch for this vulnerability.
Source

Exploit-DB raw data:

Source: https://twitter.com/halsten/status/740380171694280704

Win/Mac #MSFT Word #0day POC having 3 different forced triggers. Happy exploitation!

Let Word recover it, its essential, and then you can trigger the bug afterwards in 3 ways, Save, Close/Save, change format.


Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39906.zip