hwpapp.dll in Hangul Word Processor allows remote attackers to execute arbitrary code via a crafted heap spray, and by leveraging a "type confusion" via an HWPX file containing a crafted para text tag.
References
Link | Resource |
---|---|
http://www.hancom.com/cs_center/csDownload.do | Vendor Advisory |
http://www.securityfocus.com/bid/76694 | Third Party Advisory VDB Entry |
https://www.fireeye.com/blog/threat-research/2015/09/zero-day_hwp_exploit.html | Third Party Advisory |
https://www.fireeye.com/content/dam/fireeye-www/global/en/blog/threat-research/FireEye_HWP_ZeroDay.pdf | Third Party Advisory |
http://www.hancom.com/cs_center/csDownload.do | Vendor Advisory |
http://www.securityfocus.com/bid/76694 | Third Party Advisory VDB Entry |
https://www.fireeye.com/blog/threat-research/2015/09/zero-day_hwp_exploit.html | Third Party Advisory |
https://www.fireeye.com/content/dam/fireeye-www/global/en/blog/threat-research/FireEye_HWP_ZeroDay.pdf | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.hancom.com/cs_center/csDownload.do - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/76694 - Third Party Advisory, VDB Entry | |
References | () https://www.fireeye.com/blog/threat-research/2015/09/zero-day_hwp_exploit.html - Third Party Advisory | |
References | () https://www.fireeye.com/content/dam/fireeye-www/global/en/blog/threat-research/FireEye_HWP_ZeroDay.pdf - Third Party Advisory |
Information
Published : 2017-07-25 18:29
Updated : 2024-11-21 02:35
NVD link : CVE-2015-6585
Mitre link : CVE-2015-6585
CVE.ORG link : CVE-2015-6585
JSON object : View
Products Affected
hancom
- hangul_word_processor
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer