There are no items in your cart
Add More
Add More
Item Details | Price |
---|
CVSS Score: 9.8 | Impact: Remote Code Execution
CVE-2025-21298 is a critical Use-After-Free (UAF) vulnerability in the Windows OLE subsystem within ole32.dll
. It allows remote code execution (RCE) via malicious RTF files or email previews in applications like Microsoft Outlook, requiring zero user interaction beyond viewing the email.
Root Cause: Double-Free in UtOlePresStmToContentsStm
The function converts data between OLE streams, but mishandles memory freeing, leading to heap corruption.
// Cleanup code triggering double-free if (pstmContents) pstmContents->lpVtbl->Release(pstmContents); // Second free
Exploitation Mechanism: Attackers craft an RTF file with a malicious OLE object, triggering heap corruption and arbitrary code execution.
poc.rtf
and open it in a vulnerable application.WinDbg
to observe access violations.# Attach WinDbg to WINWORD.EXE or OUTLOOK.EXE windbg.exe -pn WINWORD.EXE
title: Suspicious RTF File Execution logsource: product: windows service: sysmon detection: selection: EventID: 11 TargetFilename: '*.rtf' condition: selection
Microsoft’s fix ensures pstmContents
is nullified after release:
+ IsEnabled = wil::details::FeatureImpl<__WilFeatureTraits_Feature_3047977275>::__private_IsEnabled(...); + if ( !IsEnabled ) + pstmContents = 0LL; // Nullify dangling pointer
CVE-2025-21298 exemplifies the risks of legacy components like OLE. Due to its zero-click nature and exploitability, immediate patching and layered security defenses are critical.
References: