Multiple NULL Pointer Dereference Vulnerabilities in Corel Quattro Pro X6
|Product:||Corel Quattro Pro X6 Standard Edition|
|Vulnerable Versions:||18.104.22.1688, other versions may be also affected|
|Tested Version:||22.214.171.1248 on Windows 7 SP1 32 bits|
|Advisory Publication:||August 27, 2012 [without technical details]|
|Vendor Notification:||August 27, 2012|
|Public Disclosure:||March 7, 2013|
|Latest Update:||March 7, 2013|
|Vulnerability Type:||NULL Pointer Dereference [CWE-476]|
|CVSSv2 Base Score:||2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered two null pointer dereference vulnerabilities in Corel Quattro Pro. Opening of a malicious QPW (Quattro Pro Spreadsheet) document causes immediate application crash, resulting in a loss of all unsaved current application data of the user.
|Currently we are not aware of any solutions from the Vendor.|
2012-08-27: Vendor Notified.
2012-09-10: Request for security fix date.
2012-09-27: Vendor says that the "vulnerabilities will be fixed with the next Service Pack".
2012-10-16: Vendor re-requested to provide a date of security fix.
2012-11-20: WordPerfect Office X6 Service Pack 2 release, vulnerability is not fixed.
2012-11-26: Vendor re-requested to provide a date of security fix.
2013-02-04: WordPerfect Office X6 Hot Patch 1 release, vulnerability is not fixed.
2013-02-26: Vendor re-requested to provide a date of security fix.
2013-03-07: Public Disclosure [Disclosure Policy].
| High-Tech Bridge Advisory HTB23112 - https://www.htbridge.com/advisory/HTB23112 - Multiple NULL Pointer Dereference Vulnerabilities in Corel Quattro Pro X6.|
 Corel Corporation - http://www.corel.com - Quattro Pro is a spreadsheet processing application of Corel's WordPerfect Office suite.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.