{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T07:28:14.537","vulnerabilities":[{"cve":{"id":"CVE-2016-4295","sourceIdentifier":"cret@cert.org","published":"2017-01-06T21:59:01.307","lastModified":"2026-05-06T22:30:45.220","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When opening a Hangul Hcell Document (.cell) and processing a particular record within the Workbook stream, an index miscalculation leading to a heap overlow can be made to occur in Hancom Office 2014. The vulnerability occurs when processing data for a formula used to render a chart via the HncChartPlugin.hplg library. Due to a lack of bounds-checking when incrementing an index that is used for writing into a buffer for formulae, the application can be made to write pointer data outside its bounds which can lead to code execution under the context of the application."},{"lang":"es","value":"Cuando se abre un Hangul Hcell Document (.cell) y se procesa un registro en particular dentro del Workbook stream, puede hacer que ocurra un error de cálculo del índice que conduce a un desbordamiento de la memoria dinámica en Hancom Office 2014. La vulnerabilidad ocurre cuando se procesan datos para una fórmula empleada para representar un gráfico a través de la librería HncChartPlugin.hplg. Debido a la falta de verificación de límites cuando se incrementa un índice que es utilizado para escribir en un búfer para fórmulas, se puede hacer que la aplicación escriba datos del puntero fuera de sus límites lo que puede conducir a ejecución de código bajo el contexto de la aplicación."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hancom:hancom_office_2014:*:*:*:*:*:*:*:*","versionEndIncluding":"9.1.0.2176","matchCriteriaId":"C0371DC9-A86B-4729-B74C-7C0AA87A54BB"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/92327","source":"cret@cert.org"},{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0150/","source":"cret@cert.org","tags":["Exploit","Technical Description","Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/92327","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0150/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Technical Description","Third Party Advisory","VDB Entry"]}]}}]}