Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3hwp-mf4v-qcwm

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."

Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."

EPSS

Процентиль: 98%
0.63012
Средний

Связанные уязвимости

nvd
около 21 года назад

Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."

EPSS

Процентиль: 98%
0.63012
Средний