Hidden malicious modules in MS VBA (Visual Basic for Applications)

Posted by Thegrideon Software on Mar 29

Credits:

Maxim Tomashevich / Thegrideon Software

Website:

https://www.thegrideon.com/

Details:

https://www.thegrideon.com/vba-internals.html

Vendor:

———————

Microsoft

Product:

———————

Visual Basic for Applications (VBA) 6.5 – 7.1 (x32 / x64)

Vulnerability Details:

———————

VBA library loads modules for execution from all streams inside “VBA” OLE
folder (based on “dir”…

CVE-2017-7258

HTTP Exploit in eMLi Portal in AuroMeera Technometrix Pvt. Ltd. eMLi allows an Attacker to View Restricted Information or (even more seriously) execute powerful commands on the web server which can lead to a full compromise of the system via Directory Path Traversal, as demonstrated by reading core-emli/Storage. The affected versions are eMLi School Management 1.0, eMLi College Campus Management 1.0, and eMLi University Management 1.0.

CVE-2017-7308

The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls.

CVE-2016-2379

The Mxit protocol uses weak encryption when encrypting user passwords, which might allow attackers to (1) decrypt hashed passwords by leveraging knowledge of client registration codes or (2) gain login access by eavesdropping on login messages and re-using the hashed passwords.

CVE-2017-5226

When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal’s input buffer, allowing an attacker to escape the sandbox.