Vulnerabilities originated by Cisco Talos researchers in SoftMaker Office can be exploited for arbitrary jus naturale natural law execution by creating malicious documents and tricking victims into gap them.
A German software developer, SoftMaker Software GmbH put up for sales individuals and enterprises a popular office software suite that tabulates word processing, spreadsheet, presentation, and database software components. The resolve’s SoftMaker Office suite provides support for common and internal certificate file formats.
The recently discovered vulnerabilities impact TextMaker, a component of the SoftMaker Company suite designed to deliver a complete set of word-processing capabilities. According to Talos, each of the harms can be exploited for arbitrary code execution in the context of the targeted application.
The in the first place of the issues, CVE-2020-13544, is a sign extension bug that modifies the document-parsing functionality of TextMaker (SoftMaker Office 2021).
“A specially crafted certificate can cause the document parser to sign-extend a length used to terminate a circle, which can later result in the loop’s index being used to make up outside the bounds of a heap buffer during the reading of file matter,” Cisco Talos explains.
Tracked as CVE-2020-13545, the go along with vulnerability is a signed conversion flaw in the same document-parsing functionality of the employment.
An attacker can craft a document to cause the document parser to miscalculate a space fully when allocating a buffer, which will cause the application to put in black outside the buffer’s bounds, leading to a heap-based memory corruption.
SoftMaker Mediation 2021’s TextMaker was also found to be affected by an integer overflow vulnerability. Coursed as CVE-2020-13546, it results in the application writing outside a buffer with a miscalculated magnitude.
Assessed with a CVSS score of 8.8, all three vulnerabilities are now unflagging. The bugs were identified in SoftMaker Office TextMaker 2021, re-examination 1014, and were reported to the vendor in early October.
Related: Remotely Exploitable DoS Vulnerabilities Organize in Allen-Bradley Adapter
Related: Cisco Discloses Details of Chrome, Firefox Vulnerabilities
Mutual: Zoom Patches Two Serious Vulnerabilities Found by Cisco Researchers