An exploitable heap-based buffer overflow vulnerability exists in the PlanMaker document parsing functionality of SoftMaker Office 2021’s PlanMaker application. A specially crafted document can cause the document parser to explicitly trust a length from a particular record type and use it to write a 16-bit null relative to a buffer allocated on the stack. Due to a lack of bounds-checking on this value, this can allow an attacker to write to memory outside of the buffer and controllably corrupt memory. This can allow an attacker to earn code execution under the context of the application. An attacker can entice the victim to open a document to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 | Exploit Technical Description Third Party Advisory |
Configurations
Information
Published : 2021-02-03 23:15
Updated : 2022-06-07 11:38
NVD link : CVE-2020-13580
Mitre link : CVE-2020-13580
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
softmaker
- planmaker_2021