CVE-2021-38110
📋 TL;DR
CVE-2021-38110 is an out-of-bounds write vulnerability in Corel WordPerfect's Word97Import200.dll that allows arbitrary code execution when parsing malicious DOC files. Users of Corel WordPerfect 2020 who open untrusted documents are affected. Exploitation requires user interaction through opening a crafted file.
💻 Affected Systems
- Corel WordPerfect 2020
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the victim's machine in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement.
Likely Case
Malware installation or data exfiltration when users open malicious DOC files from phishing emails or untrusted sources.
If Mitigated
Limited impact with proper security controls preventing execution of malicious payloads or containing the compromise.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file) but no authentication. No public exploit code identified in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to latest version of WordPerfect 2020 (specific version not specified in references)
Vendor Advisory: https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products
Restart Required: Yes
Instructions:
1. Open Corel WordPerfect 2020. 2. Navigate to Help > Check for Updates. 3. Follow prompts to download and install available updates. 4. Restart WordPerfect and system if required.
🔧 Temporary Workarounds
Disable Word97Import200.dll
windowsTemporarily disable or restrict access to the vulnerable DLL to prevent exploitation
takeown /f "C:\Program Files\Corel\WordPerfect Office 2020\Programs\Word97Import200.dll"
icacls "C:\Program Files\Corel\WordPerfect Office 2020\Programs\Word97Import200.dll" /deny Everyone:(R,X)
Application Control Policy
windowsUse Windows AppLocker or similar to block execution of Word97Import200.dll
New-AppLockerPolicy -RuleType Path -Action Deny -Path "C:\Program Files\Corel\WordPerfect Office 2020\Programs\Word97Import200.dll" -User Everyone
🧯 If You Can't Patch
- Implement application whitelisting to prevent unauthorized DLL execution
- Educate users to never open DOC files from untrusted sources and disable automatic document opening
🔍 How to Verify
Check if Vulnerable:
Check WordPerfect version in Help > About WordPerfect. If version is 20.0.0.200, system is vulnerable.
Check Version:
wmic product where "name like 'WordPerfect%'" get version
Verify Fix Applied:
Verify WordPerfect version after update shows a version higher than 20.0.0.200 and check that Word97Import200.dll file properties show updated version.
📡 Detection & Monitoring
Log Indicators:
- Windows Application logs showing WordPerfect crashes with exception codes like 0xC0000005 (ACCESS_VIOLATION)
- Process creation events for WordPerfect spawning unexpected child processes
Network Indicators:
- Unusual outbound connections from WordPerfect process to external IPs
SIEM Query:
source="Windows Security" EventCode=4688 ProcessName="*WordPerfect*" | stats count by ProcessCommandLine
🔗 References
- https://www.fortiguard.com/zeroday/FG-VD-21-036
- https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products
- https://www.fortiguard.com/zeroday/FG-VD-21-036
- https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products