### [CVE-2018-3998](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3998) ![](https://img.shields.io/static/v1?label=Product&message=Atlantis%20Word%20Processor&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=heap-based%20buffer%20overflow&color=brighgreen) ### Description An exploitable heap-based buffer overflow vulnerability exists in the Windows enhanced metafile parser of Atlantis Word Processor, version 3.2.5.0. A specially crafted image embedded within a document can cause an undersized allocation, resulting in an overflow when the application tries to copy data into it. An attacker must convince a victim to open a document in order to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0666 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0666 #### Github No PoCs found on GitHub currently.