There are no items in your cart
Add More
Add More
| Item Details | Price | ||
|---|---|---|---|
CVSS Score: 9.8 | Impact: Remote Code Execution
CVE-2025-21298 is a critical Use-After-Free (UAF) vulnerability in the Windows OLE subsystem within ole32.dll. It allows remote code execution (RCE) via malicious RTF files or email previews in applications like Microsoft Outlook, requiring zero user interaction beyond viewing the email.
Root Cause: Double-Free in UtOlePresStmToContentsStm
The function converts data between OLE streams, but mishandles memory freeing, leading to heap corruption.
// Cleanup code triggering double-free
if (pstmContents)
pstmContents->lpVtbl->Release(pstmContents); // Second free
Exploitation Mechanism: Attackers craft an RTF file with a malicious OLE object, triggering heap corruption and arbitrary code execution.
poc.rtf and open it in a vulnerable application.WinDbg to observe access violations.# Attach WinDbg to WINWORD.EXE or OUTLOOK.EXE windbg.exe -pn WINWORD.EXE
title: Suspicious RTF File Execution
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 11
TargetFilename: '*.rtf'
condition: selection
Microsoft’s fix ensures pstmContents is nullified after release:
+ IsEnabled = wil::details::FeatureImpl<__WilFeatureTraits_Feature_3047977275>::__private_IsEnabled(...); + if ( !IsEnabled ) + pstmContents = 0LL; // Nullify dangling pointer
CVE-2025-21298 exemplifies the risks of legacy components like OLE. Due to its zero-click nature and exploitability, immediate patching and layered security defenses are critical.
References: