Current Description
An exploitable heap-based buffer overflow vulnerability exists in the PlanMaker document parsing functionality of SoftMaker Office 2021’s PlanMaker application. A specially crafted document can cause the document parser to explicitly trust a length from a particular record type and use it to write a 16-bit null relative to a buffer allocated on the stack. Due to a lack of bounds-checking on this value, this can allow an attacker to write to memory outside of the buffer and controllably corrupt memory. This can allow an attacker to earn code execution under the context of the application. An attacker can entice the victim to open a document to trigger this vulnerability.
Analysis Description
An exploitable heap-based buffer overflow vulnerability exists in the PlanMaker document parsing functionality of SoftMaker Office 2021’s PlanMaker application. A specially crafted document can cause the document parser to explicitly trust a length from a particular record type and use it to write a 16-bit null relative to a buffer allocated on the stack. Due to a lack of bounds-checking on this value, this can allow an attacker to write to memory outside of the buffer and controllably corrupt memory. This can allow an attacker to earn code execution under the context of the application. An attacker can entice the victim to open a document to trigger this vulnerability.
Severity
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].
Weakness Enumeration
CWE-ID | CWE Name | Source |
---|---|---|
CWE-787 | Out-of-bounds Write | NIST |
Change History
1 change records found show changes
Initial Analysis 2/09/2021 9:30:33 AM
Action | Type | Old Value | New Value |
---|---|---|---|
Added | CPE Configuration |
OR *cpe:2.3:a:softmaker:planmaker_2021:1014:*:*:*:*:*:*:* |
|
Added | CVSS V2 |
NIST (AV:N/AC:M/Au:N/C:P/I:P/A:P) |
|
Added | CVSS V2 Metadata |
Victim must voluntarily interact with attack mechanism |
|
Added | CVSS V3.1 |
NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
Added | CWE |
NIST CWE-787 |
|
Changed | Reference Type |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 No Types Assigned |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191 Exploit, Technical Description, Third Party Advisory |