René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
3.8 KiB
JSON

{
"id": "CVE-2016-4298",
"sourceIdentifier": "cret@cert.org",
"published": "2017-01-06T21:59:01.367",
"lastModified": "2017-01-11T02:59:11.730",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will attempt to allocate space for a list of elements using a length from the file. When calculating this length, an integer overflow can be made to occur which will cause the buffer to be undersized when the application tries to copy file data into the object containing this structure. This allows one to overwrite contiguous data in the heap which can lead to code-execution under the context of the application."
},
{
"lang": "es",
"value": "Cuando se abre un Hangul HShow Document (.hpt) y se procesa una estructura dentro del documento, Hancom Office 2014 tratar\u00e1 de asignar espacio para una lista de elementos utilizando una longitud del archivo. Cuando se calcula esta longitud, puede hacer que ocurra un desbordamiento de entero que provocar\u00e1 que el b\u00fafer se subdimensione cuando la aplicaci\u00f3n trata de copiar datos del archivo en el objeto que contiene esta estructura. Esto permite a uno sobreescribir datos contig\u00fcos en la memoria din\u00e1mica lo que puede conducir a una ejecuci\u00f3n de c\u00f3digo bajo el contexto de la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hancom:hancom_office_2014:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.1.0.2176",
"matchCriteriaId": "C0371DC9-A86B-4729-B74C-7C0AA87A54BB"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/92325",
"source": "cret@cert.org"
},
{
"url": "http://www.talosintelligence.com/reports/TALOS-2016-0144/",
"source": "cret@cert.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory",
"VDB Entry"
]
}
]
}