CVE-2017-11882 - 3 ways to perform technical analysis, 1 easy way to protect

aBWAHxpXHEk/default.jpg

Here I show you technical analysis of a fascinating exploit CVE-2017-11882 which takes advantage of a buffer overflow vulnerability in Microsoft Office Equation Editor (EQNEDT32.exe).

I demonstrate how to quickly analyse this exploit from a behavioural point of view, show you how to run rtfdump.py to extract the malicious object and also how to attach the victim process to a debugger so you can see for yourself the buffer being overflowed.

Malicious Doc File:
insurance-2017-2018.doc
MD5: 080b3a6dc6ddf645f6c156e1561eb0b8

Tools Used:
Process Monitor: https://docs.microsoft.com/en-us/sysi...
Burp Suite : https://portswigger.net/burp
REMNux: https://remnux.org/
RTFdump: https://blog.didierstevens.com/2016/0...
gflags.exe: https://docs.microsoft.com/en-us/wind...
x64dbg: x64dbg.com

Recommended Reading:
https://embedi.com/blog/skeleton-clos...
https://researchcenter.paloaltonetwor...

Patching:
You should definitely update your Office environment. In the interim you can apply the following registry updates to disable the EQNEDT32.exe process from launching:

reg add "HKLM\SOFTWARE\Microsoft\Office\Common\COM Compatibility\{0002CE02-0000- 0000-C000-000000000046}" /v "Compatibility Flags" /t REG_DWORD /d 0x400

reg add "HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\Common\COM Compatibility\{0002CE02-0000-0000-C000-000000000046}" /v "Compatibility Flags" /t REG_DWORD /d 0x400

More here from Microsoft:
https://support.microsoft.com/en-us/h...

If you liked the video, press Like, if you loved it, please subscribe. Also, please follow me on https://twitter.com/cybercdh

Thanks for watching!



aBWAHxpXHEk/default.jpg
CVE-2017-11882 - 3 ways to perform technical analysis, 1 easy way to protect CVE-2017-11882 - 3 ways to perform technical analysis, 1 easy way to protect Reviewed by Anonymous on January 16, 2018 Rating: 5