Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-3333 PoC — Microsoft Office Open XML文件格式转换器栈缓冲区溢出漏洞

Source
Associated Vulnerability
Title:Microsoft Office Open XML文件格式转换器栈缓冲区溢出漏洞 (CVE-2010-3333)
Description:Microsoft Office 是微软发布的非常流行的办公软件套件。 基于Mac平台的Microsoft Office XP SP3,Office 2003 SP3,Office 2007 SP2,Office 2010,Office 2004以及2008版本,基于Mac 2011平台的Office,以及基于MAC平台的Open XML文件格式转换器中存在基于栈的缓冲区溢出漏洞。远程攻击者可以借助特制的RTF数据执行任意代码。该漏洞又名"RTF栈缓冲区溢出漏洞"。
Description
CVE-2010-3333复现
File Snapshot

[4.0K] /data/pocs/9c835ad4a2fe131201eef15dc2ecc618faf790ad ├── [4.0K] cve-2010-3333.assets │   ├── [ 62K] image-20220718172627548.png │   ├── [1.4K] image-20220719102743204.png │   ├── [9.1K] image-20220719103437031.png │   ├── [ 63K] image-20220719142557452.png │   ├── [ 68K] image-20220719142740326.png │   ├── [ 67K] image-20220719143745723.png │   ├── [ 67K] image-20220719143751686.png │   ├── [ 11K] image-20220719143951585.png │   ├── [ 71K] image-20220719145604575.png │   ├── [ 49K] image-20220719151744253.png │   ├── [ 75K] image-20220719152616718.png │   ├── [ 57K] image-20220719154113995.png │   ├── [ 10K] image-20220719154125950.png │   ├── [ 70K] image-20220719154624427.png │   ├── [ 29K] image-20220719154835528.png │   ├── [ 43K] image-20220719155417249.png │   ├── [ 57K] image-20220719155440086.png │   ├── [ 27K] image-20220719155458642.png │   ├── [ 46K] image-20220719160733111.png │   ├── [ 19K] image-20220719163234369.png │   ├── [ 19K] image-20220719165425470.png │   ├── [7.8K] image-20220719170021569.png │   ├── [335K] image-20220719172903210.png │   ├── [ 33K] image-20220719173027026.png │   ├── [ 17K] image-20220719174531136.png │   ├── [ 24K] image-20220719174646591.png │   ├── [ 33K] image-20220719174839642.png │   ├── [ 13K] image-20220719175044851.png │   ├── [7.5K] image-20220719175249916.png │   ├── [6.2K] image-20220719180930573.png │   ├── [ 44K] image-20220719181121383.png │   ├── [ 52K] image-20220719181225848.png │   ├── [ 31K] image-20220719181252961.png │   ├── [5.2K] image-20220719181322580.png │   ├── [5.2K] image-20220719182336736.png │   ├── [ 21K] image-20220719191125135.png │   ├── [ 12K] image-20220719191528017.png │   ├── [ 27K] image-20220719194532639.png │   ├── [6.1K] image-20220719195124665.png │   ├── [ 66K] image-20220719201408684.png │   ├── [ 94K] image-20220720105554455.png │   ├── [ 15K] image-20220720111438848.png │   ├── [6.6K] image-20220720111457531.png │   ├── [7.2K] image-20220720111856020.png │   ├── [ 40K] image-20220720121850020.png │   ├── [ 11K] image-20220720131514481.png │   ├── [ 25K] image-20220720131636882.png │   ├── [ 43K] image-20220720131658416.png │   ├── [ 83K] image-20220720141803029.png │   ├── [229K] image-20220720142015005.png │   ├── [ 16K] image-20220720145247593.png │   ├── [2.6K] image-20220720145912236.png │   ├── [ 19K] image-20220720155254186.png │   ├── [ 31K] image-20220720155445444.png │   ├── [ 43K] image-20220720155556171.png │   ├── [ 21K] image-20220720155645118.png │   ├── [ 54K] image-20220720162515911.png │   ├── [ 10K] image-20220720162543062.png │   └── [ 37K] image-20220720164505428.png ├── [102K] cve_2010_3333_calc.rtf ├── [128K] cve_2010_3333_crash.rtf ├── [ 20K] cve-2010-3333.md ├── [1.9M] cve-2010-3333.pdf ├── [101K] msf.rtf ├── [ 12M] MSO.DLL ├── [ 523] test.rtf └── [ 57K] 演示文稿1.pptx 1 directory, 67 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.