lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201312170921.rBH9L0e7012142@sf01web3.securityfocus.com>
Date: Tue, 17 Dec 2013 09:21:00 GMT
From: diroverflow@...il.com
To: bugtraq@...urityfocus.com
Subject: Hancom Office '.hml' file heap-based buffer overflow

There is a vulnerability in Hancom Office 2010 SE, which can be exploited by malicious people to compromise a user's system.
'.hml' is a type of XML document files which is defined by Hancom. Contructing a long TEXTART tag will cause a heap-based buffer overflow. Such as:

<TEXTART Text="AAAAAAAA...(more than 500 bytes)" X0="0" X1="14173" X2="14173" X3="0" Y0="0" Y1="0" Y2="14173" Y3="14173">

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.The vulnerabilities are confirmed in version 8.5.8. Other versions may also be affected.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ