{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T04:07:00.968","vulnerabilities":[{"cve":{"id":"CVE-2016-4298","sourceIdentifier":"cret@cert.org","published":"2017-01-06T21:59:01.367","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will attempt to allocate space for a list of elements using a length from the file. When calculating this length, an integer overflow can be made to occur which will cause the buffer to be undersized when the application tries to copy file data into the object containing this structure. This allows one to overwrite contiguous data in the heap which can lead to code-execution under the context of the application."},{"lang":"es","value":"Cuando se abre un Hangul HShow Document (.hpt) y se procesa una estructura dentro del documento, Hancom Office 2014 tratará de asignar espacio para una lista de elementos utilizando una longitud del archivo. Cuando se calcula esta longitud, puede hacer que ocurra un desbordamiento de entero que provocará que el búfer se subdimensione cuando la aplicación trata de copiar datos del archivo en el objeto que contiene esta estructura. Esto permite a uno sobreescribir datos contigüos en la memoria dinámica lo que puede conducir a una ejecución de código bajo el contexto de la aplicación."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-190"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hancom:hancom_office_2014:*:*:*:*:*:*:*:*","versionEndIncluding":"9.1.0.2176","matchCriteriaId":"C0371DC9-A86B-4729-B74C-7C0AA87A54BB"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/92325","source":"cret@cert.org"},{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0144/","source":"cret@cert.org","tags":["Exploit","Technical Description","Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/92325","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0144/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Technical Description","Third Party Advisory","VDB Entry"]}]}}]}