lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201312170921.rBH9L0e7012142@sf01web3.securityfocus.com> Date: Tue, 17 Dec 2013 09:21:00 GMT From: diroverflow@...il.com To: bugtraq@...urityfocus.com Subject: Hancom Office '.hml' file heap-based buffer overflow There is a vulnerability in Hancom Office 2010 SE, which can be exploited by malicious people to compromise a user's system. '.hml' is a type of XML document files which is defined by Hancom. Contructing a long TEXTART tag will cause a heap-based buffer overflow. Such as: <TEXTART Text="AAAAAAAA...(more than 500 bytes)" X0="0" X1="14173" X2="14173" X3="0" Y0="0" Y1="0" Y2="14173" Y3="14173"> Successful exploitation of the vulnerabilities may allow execution of arbitrary code.The vulnerabilities are confirmed in version 8.5.8. Other versions may also be affected.
Powered by blists - more mailing lists