An exploitable arbitrary write vulnerability exists in the open document format parser of the Atlantis Word Processor, version 3.2.7.2, while trying to null-terminate a string. A specially crafted document can allow an attacker to pass an untrusted value as a length to a constructor. This constructor will miscalculate a length and then use it to calculate the position to write a null byte. This can allow an attacker to corrupt memory, which can result in code execution under the context of the application. An attacker must convince a victim to open a specially crafted document in order to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0711 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Jun 2022, 17:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-131 |
Information
Published : 2018-12-01 18:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-4038
Mitre link : CVE-2018-4038
CVE.ORG link : CVE-2018-4038
JSON object : View
Products Affected
atlantiswordprocessor
- atlantis_word_processor
CWE
CWE-131
Incorrect Calculation of Buffer Size