mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
108 lines
3.7 KiB
JSON
108 lines
3.7 KiB
JSON
{
|
|
"id": "CVE-2015-2810",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2015-05-15T22:59:00.093",
|
|
"lastModified": "2024-11-21T02:28:07.700",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Integer overflow in the HwpApp::CHncSDS_Manager function in Hancom Office HanWord processor, as used in Hwp 2014 VP before 9.1.0.2342, HanWord Viewer 2007 and Viewer 2010 8.5.6.1158, and HwpViewer 2014 VP 9.1.0.2186, allows remote attackers to cause a denial of service (crash) and possibly \"influence the program's execution flow\" via a document with a large paragraph size, which triggers heap corruption."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de enteros en la funci\u00f3n HwpApp::CHncSDS_Manager en el procesador Hancom Office HanWord, utilizado en Hwp 2014 VP anterior a 9.1.0.2342, HanWord Viewer 2007 y Viewer 2010 8.5.6.1158, y HwpViewer 2014 VP 9.1.0.2186, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente 'influir en el flujo de ejecuci\u00f3n del programa' a trav\u00e9s de un documento con un tama\u00f1o grande de p\u00e1rrafo, lo que provoca una corrupci\u00f3n de la memoria din\u00e1mica."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 7.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": true,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-189"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hancom:hanword_viewer_2007:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "322BBEBD-4EB9-4A21-B54B-FC9391D1D308"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hancom:hanword_viewer_2010:8.5.6.1158:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57B710A2-CB13-451B-B75F-4B4B7726B51A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hancom:hwp_2014:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "9.1.0.2342",
|
|
"matchCriteriaId": "69D17D28-EE81-4F0A-85F5-3B5FB7DA9A7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:hancom:hwpviewer_2014:9.1.0.2186:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17DACEC4-3D44-4E5E-A4A5-923F70CD4F63"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://seclists.org/bugtraq/2015/Apr/89",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/74153",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/bugtraq/2015/Apr/89",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/74153",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |