This Metasploit module exploits a stack-based buffer overflow in David Manthey's Orbital Viewer. When processing .ORB files, data is read from file into a fixed-size stack buffer using the fscanf function. Since no bounds checking is done, a buffer overflow can occur. Attackers can execute arbitrary code by convincing their victim to open an ORB file.
46ef3749fafdda88696ed761f5421d74f5a63031de7f9f8a7eedcc6d42bda3cd
Orbital Viewer version 1.04 local universal SEH overflow exploit that creates a malicious .orb file. Comes complete with calc.exe, reverse shell, and bind shell execution options.
5994c9312d2de35abf67d5cadda0954e2ebe6cea9934c77c108332ec3128da1f