Untrusted Pointer Dereference Vulnerability in Corel WordPerfect X6
Advisory ID: | HTB23114 |
Product: | Corel WordPerfect X6 Standard Edition |
Vendor: | Corel Corporation |
Vulnerable Versions: | 16.0.0.388, other versions may be also affected |
Tested Version: | 16.0.0.388 on Windows 7 SP1 32 bits |
Advisory Publication: | September 12, 2012 [without technical details] |
Vendor Notification: | September 12, 2012 |
Public Disclosure: | March 7, 2013 |
Latest Update: | March 7, 2013 |
Vulnerability Type: | Untrusted Pointer Dereference [CWE-822] |
CVE Reference: | CVE-2012-4900 |
Risk Level: | Low |
CVSSv2 Base Score: | 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P) |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered an untrusted pointer dereference vulnerability in Corel WordPerfect. Opening of a malicious WPD (WordPerfect Document) causes immediate application crash, resulting in a loss of all unsaved current application data of the user. | |
Solution: | |
Currently we are not aware of any solutions from the Vendor. Disclosure Timeline: 2012-09-12: Vendor Notified. 2012-09-19: Request for security fix date. 2012-09-27: Vendor says that the "vulnerabilities will be fixed with the next Service Pack". 2012-10-16: Vendor re-requested to provide a date of security fix. 2012-11-20: WordPerfect Office X6 Service Pack 2 release, vulnerability is not fixed. 2012-11-26: Vendor re-requested to provide a date of security fix. 2013-02-04: WordPerfect Office X6 Hot Patch 1 release, vulnerability is not fixed. 2013-02-26: Vendor re-requested to provide a date of security fix. 2013-03-07: Public Disclosure [Disclosure Policy]. | |
References: | |
[1] High-Tech Bridge Advisory HTB23114 - https://www.immuniweb.com/advisory/HTB23114 - Untrusted Pointer Dereference Vulnerability in Corel WordPerfect X6. [2] Corel Corporation - http://www.corel.com - WordPerfect is a word processing application of Corel's WordPerfect Office suite. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. | |
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.