{ "id": "CVE-2022-33896", "sourceIdentifier": "talos-cna@cisco.com", "published": "2022-10-07T15:15:15.553", "lastModified": "2024-11-21T07:08:33.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer underflow vulnerability exists in the way Hword of Hancom Office 2020 version 11.0.0.5357 parses XML-based office files. A specially-crafted malformed file can cause memory corruption by using memory before buffer start, which can lead to code execution. A victim would need to access a malicious file to trigger this vulnerability." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de desbordamiento del b\u00fafer en la forma en que Hword de Hancom Office 2020 versi\u00f3n 11.0.0.5357, analiza los archivos de oficina basados en XML. Un archivo malformado especialmente dise\u00f1ado puede causar la corrupci\u00f3n de la memoria mediante el uso de la memoria antes del inicio del b\u00fafer, lo que puede conllevar a una ejecuci\u00f3n de c\u00f3digo. Una v\u00edctima necesitar\u00eda acceder a un archivo malicioso para desencadenar esta vulnerabilidad" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ], "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "talos-cna@cisco.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-124" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:hancom:hancom_office_2020:11.0.0.5357:*:*:*:*:*:*:*", "matchCriteriaId": "3920CE66-510C-4FEA-A687-1E62A38C7032" } ] } ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1574", "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1574", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }