### [CVE-2018-3978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3978) ![](https://img.shields.io/static/v1?label=Product&message=Atlantis%20Word%20Processor&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=heap-based%20buffer%20overflow&color=brighgreen) ### Description An exploitable out-of-bounds write vulnerability exists in the Word Document parser of the Atlantis Word Processor 3.0.2.3, 3.0.2.5. A specially crafted document can cause Atlantis to write a value outside the bounds of a heap allocation, resulting in a buffer overflow. An attacker must convince a victim to open a document in order to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0646 - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0646 #### Github No PoCs found on GitHub currently.