Latest from our blog
Untrusted Pointer Dereference Vulnerability in Corel WordPerfect X6
|Product:||Corel WordPerfect X6 Standard Edition|
|Vulnerable Versions:||184.108.40.2068, other versions may be also affected|
|Tested Version:||220.127.116.118 on Windows 7 SP1 32 bits|
|Advisory Publication:||September 12, 2012 [without technical details]|
|Vendor Notification:||September 12, 2012|
|Public Disclosure:||March 7, 2013|
|Latest Update:||March 7, 2013|
|Vulnerability Type:||Untrusted Pointer Dereference [CWE-822]|
|CVSSv2 Base Score:||2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P)|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge Security Research Lab discovered an untrusted pointer dereference vulnerability in Corel WordPerfect. Opening of a malicious WPD (WordPerfect Document) causes immediate application crash, resulting in a loss of all unsaved current application data of the user.
|Currently we are not aware of any solutions from the Vendor.|
2012-09-12: Vendor Notified.
2012-09-19: Request for security fix date.
2012-09-27: Vendor says that the "vulnerabilities will be fixed with the next Service Pack".
2012-10-16: Vendor re-requested to provide a date of security fix.
2012-11-20: WordPerfect Office X6 Service Pack 2 release, vulnerability is not fixed.
2012-11-26: Vendor re-requested to provide a date of security fix.
2013-02-04: WordPerfect Office X6 Hot Patch 1 release, vulnerability is not fixed.
2013-02-26: Vendor re-requested to provide a date of security fix.
2013-03-07: Public Disclosure [Disclosure Policy].
| High-Tech Bridge Advisory HTB23114 - https://www.htbridge.com/advisory/HTB23114 - Untrusted Pointer Dereference Vulnerability in Corel WordPerfect X6.|
 Corel Corporation - http://www.corel.com - WordPerfect is a word processing application of Corel's WordPerfect Office suite.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.