0-Day vulnerabilities in all Corel products

Ερευνητές από την Core Security αποκάλυψαν ένα τρωτό σημείο σε ένα DLL που χρησιμοποιείται από διάφορες εφαρμογές της Corel. Οι ερευνητές αποκάλυψαν την ευπάθεια αφού προσπάθησαν επανειλημμένως να επικοινωνήσουν με την Cοrel η οποία δεν ανταποκρίθηκε. Έτσι δεν υπάρχουν διαθέσιμες ενημερώσεις για τις ευπάθειες, οι οποίες μπορούν να επιτρέψουν απομακρυσμένη εκτέλεση .corel logo

Η Corel is a well-known software company for graphics, design and video applications. Its applications are the well-known ones: CorelDRAW, Photo-Paint, and researchers Core developers discovered that many of them contain a DLL file that contains the vulnerability.

"When a Corel file is opened, the directory in that file is used to locate them DLL, which could allow an attacker to execute arbitrary commands by inserting a malicious DLL in the same directory as the file,” the researchers report.

Corel applications that can be affected are: CorelDRAW X7, Corel Photo-Paint X7, Corel PaintShop Pro X7, Corel Painter 2015, Corel CAD 2014, Corel VideoStudio PRO X7, Corel PDF Fusion and Corel FastFlick. The DLL that the applications look for is called "wintab32.dll" and does not control the storage path. This allows a malicious DLL with the same name to be copied to the relevant folder and executed within the application.

Core Security researchers contacted Corel about the , on December 9, and received no response. They tried again, on December 17, and again received no answer. They made a third attempt to contact Corel via Twitter, without success, and so released the vulnerability today.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).