This is a detailed technical analysis of a heap overflow vulnerability in Microsoft Reader, including disassembly traces, root cause analysis, and proof-of-concept descriptions. The author provides specific details about memory corruption mechanics and affected functions.
Classification
Writeup 100%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:Microsoft Reader <= 2.1.1.3143 (PC) and <= 2.6.1.7169 (Origami)
No auth needed
Prerequisites:Victim must open a maliciously crafted .lit file