An exploitable heap-based buffer overflow vulnerability exists in the PlanMaker document parsing functionality of SoftMaker Office 2021’s PlanMaker application. A specially crafted document can cause the document parser to explicitly trust a length from a particular record type and use it to write a 16-bit null relative to a buffer allocated on the stack. Due to a lack of bounds-checking on this value, this can allow an attacker to write to memory outside of the buffer and controllably corrupt memory. This can allow an attacker to earn code execution under the context of the application. An attacker can entice the victim to open a document to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 | Exploit Technical Description Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2021-02-04 07:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13580
Mitre link : CVE-2020-13580
CVE.ORG link : CVE-2020-13580
JSON object : View
Products Affected
softmaker
- planmaker_2021
CWE
CWE-787
Out-of-bounds Write