A stack-based buffer overflow (Remote Code Execution) issue was discovered in Design Science MathType 6.9c. This occurs in a function call in which the first argument is a corrupted offset value and the second argument is a stack buffer. This is fixed in 6.9d.
References
Link | Resource |
---|---|
https://drive.google.com/open?id=1V-AA1InXBPhgJviabilttkaP4DYay9f6 | Exploit Third Party Advisory |
http://www.dessci.com/en/dl/ | Product Vendor Advisory |
Configurations
Information
Published : 2018-02-27 21:29
Updated : 2021-05-27 12:58
NVD link : CVE-2018-6638
Mitre link : CVE-2018-6638
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
wiris
- mathtype