CVE-2015-6948
Corel WordPerfect Heap Buffer Overflow Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the Microsoft Word document conversion feature in Corel WordPerfect allows remote attackers to execute arbitrary code via a crafted document.
Desbordamiento de buffer basado en memoria dinámica en la funcionalidad conversión de documento en Corel WordPerfect, permite a atacantes remotos ejecutar código arbitrario a través de un documento manipulado.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Corel WordPerfect. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the conversion from documents formatted for Microsoft Word. By providing a malformed file, an attacker can cause memory to be written past the end of a heap buffer. An attacker could leverage this vulnerability to execute arbitrary code under the context of the current user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-09-02 CVE Published
- 2015-09-15 CVE Reserved
- 2024-07-05 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securitytracker.com/id/1033559 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-15-410 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Corel Search vendor "Corel" | Wordperfect Search vendor "Corel" for product "Wordperfect" | * | - |
Affected
|