7.2
CVSSv2

CVE-2015-6132

Published: 09/12/2015 Updated: 15/05/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 730
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows rt 8.1 -

microsoft windows server 2012 r2

microsoft windows server 2008 r2

microsoft windows vista -

microsoft windows 8 -

microsoft windows 8.1 -

microsoft windows 7 -

microsoft windows 10 -

microsoft windows 10 1511

microsoft windows rt -

microsoft windows server 2012 -

microsoft windows server 2008 -

Exploits

Source: codegooglecom/p/google-security-research/issues/detail?id=556 It is possible for an attacker to execute a DLL planting attack in Microsoft Office 2010 on Windows 7 x86 with a specially crafted OLE object This attack also works on Office 2013 running on Windows 7 x64 Other platforms were not tested The attached POC document "pl ...
require 'zip' require 'base64' require 'msf/core' require 'rex/ole' class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT include Msf::Exploit::EXE def initialize(info = {}) super(update_info(info, 'Name' => 'Office OLE Multiple DLL Side Loading Vulnerabilities', 'Descri ...

Github Repositories

Microsoft Office / COM Object DLL Planting

CVE-2015-6132 Microsoft Office / COM Object DLL Planting Original poc: wwwexploit-dbcom/exploits/38968/ Running pocrtf with mqrtdll in the same directory will trigger the dll, which in this case (pop calc) making Down/exec Dll will work as well Exporting the dll to run from Samba/WebDav is possible twittercom/hex00r