A stack-based buffer overflow (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. This occurs in a function call in which the first argument is a corrupted offset value and the second argument is a stack buffer. This is fixed in 6.9d.
References
Link | Resource |
---|---|
http://www.dessci.com/en/dl/ | Product Vendor Advisory |
https://drive.google.com/open?id=1V-AA1InXBPhgJviabilttkaP4DYay9f6 | Exploit Third Party Advisory |
http://www.dessci.com/en/dl/ | Product Vendor Advisory |
https://drive.google.com/open?id=1V-AA1InXBPhgJviabilttkaP4DYay9f6 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.dessci.com/en/dl/ - Product, Vendor Advisory | |
References | () https://drive.google.com/open?id=1V-AA1InXBPhgJviabilttkaP4DYay9f6 - Exploit, Third Party Advisory |
27 May 2021, 19:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wiris:mathtype:6.9c:*:*:*:*:*:*:* |
Information
Published : 2018-02-28 05:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-6638
Mitre link : CVE-2018-6638
CVE.ORG link : CVE-2018-6638
JSON object : View
Products Affected
wiris
- mathtype
CWE
CWE-787
Out-of-bounds Write