This Metasploit module allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to processing of contact files.
61fc32618fc4266b946f0130bc44154af701a9c7982e3296bf93f3a548745f3d