A use-after-free vulnerability exists in the footerr functionality of Hancom Office 2020 HWord 11.0.0.7520. A specially crafted .doc file can lead to a use-after-free. An attacker can trick a user into opening a malformed file to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759 - Exploit, Third Party Advisory |
28 Sep 2023, 22:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:hancom:hancom_office_2020:11.0.0.7520:*:*:*:*:*:*:* | |
CWE | CWE-416 | |
First Time |
Hancom hancom Office 2020
Hancom |
|
References | (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
27 Sep 2023, 15:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-27 15:18
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32541
Mitre link : CVE-2023-32541
CVE.ORG link : CVE-2023-32541
JSON object : View
Products Affected
hancom
- hancom_office_2020
CWE
CWE-416
Use After Free