Exploiting CVE-2018-0802 Office Equation Vulnerabilty

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=Q7i0goaCu7w



Duration: 0:38
7,794 views
9


Check Point Software Technologies Research Team has discovered a new vulnerability (CVE-2018-0802) in the Office Equation 3.0 process (EQNEDT32.EXE).

This is a POC video of the vulnerability being exploited while bypassing the new ASLR mitigation added by Microsoft.

For more information read: https://research.checkpoint.com/another-office-equation-rce-vulnerability/




Other Videos By Check Point Software


2018-03-08Happy International Women's Day 2018
2018-03-02Advanced Cloud Security - CloudGuard Overview
2018-02-13Advanced Cyber Security for 2019 | Prevent Gen V Cyber Attacks with Check Point Infinity
2018-02-12Malware Protection 2018 - Public Health Service Prevents, Not Just Detects, Advanced Threats
2018-02-12Advanced Cyber Security for 2018 | Prevent 5th Generation Cyber Attacks with Check Point Infinity
2018-02-12The Mississippi Secretary of State & CTO Prevents Ransomware
2018-01-28What is CheckMates?
2018-01-25JVLat distributes video games securely with Check Point
2018-01-19Global Asset Management Company Secures Private Cloud
2018-01-10Dorit Dor’s Invitation to CPX 360 2018
2018-01-09Exploiting CVE-2018-0802 Office Equation Vulnerabilty
2018-01-08Deploy Small Business Appliances with the Zero Touch Cloud Service
2018-01-04Gil Shwed's Invitation to CPX 360 2018
2018-01-04‘LightsOut’ Malware In The Google Play Store: How It Works
2017-12-22Advanced Cyber Security | Check Point Infinity | Technical Deep Dive with Jeff Schwartz
2017-12-22BBC News, Aatish Patni interview on Uber Data Breach
2017-12-19HTTPS Inspection on Small Business Appliances
2017-12-13Check Point R80.10 Policy Management – Permissions per layer
2017-12-11Trial Threat Emulation on Small Business Appliances
2017-12-07Check Point R80.10 Logs and Monitor Pane – Hide Identities within Reports, Views and Logs.
2017-12-04ParseDroid – Targeting The Android Development & Research Community



Tags:
microsoft
vulnerability
check point