Vulnerabilities > CVE-2018-3999 - Incorrect Conversion between Numeric Types vulnerability in Atlantiswordprocessor Atlantis Word Processor 3.2.5.0

047910
CVSS 7.8 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
local
low complexity
atlantiswordprocessor
CWE-681

Summary

An exploitable stack-based buffer overflow vulnerability exists in the JPEG parser of Atlantis Word Processor, version 3.2.5.0. A specially crafted image embedded within a document can cause a length to be miscalculated and underflow. This length is then treated as unsigned and then used in a copying operation. Due to the length underflow, the application will then write outside the bounds of a stack buffer, resulting in a buffer overflow. An attacker must convince a victim to open a document in order to trigger this vulnerability.

Vulnerable Configurations

Part Description Count
Application
Atlantiswordprocessor
1

Talos

idTALOS-2018-0667
last seen2019-05-29
published2018-10-01
reporterTalos Intelligence
sourcehttp://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0667
titleAtlantis Word Processor JPEG length underflow code execution vulnerability