Hello everyone, this month FireEye published a vulnerability known as CVE-2017-0199, which makes use of OLEv2 links in existing documents.
So, what is this OLEv2 object links? It’s basically an object (file) that we include in our file and it’s content will be loaded into the document. In short: file inside file
Quite confusing to start, but when we start using it, and exploiting this vulnerability, we understand better how it works.
Continue reading “Exploiting CVE-2017-0199 – Complete Guide”