Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cvm7-68v9-chqf

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.The update addresses the vulnerability by correcting how Windows handles cabinet files., aka 'Windows Remote Code Execution Vulnerability'.

A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.The update addresses the vulnerability by correcting how Windows handles cabinet files., aka 'Windows Remote Code Execution Vulnerability'.

EPSS

Процентиль: 97%
0.40477
Средний

Связанные уязвимости

CVSS3: 8.8
nvd
около 5 лет назад

A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.The update addresses the vulnerability by correcting how Windows handles cabinet files., aka 'Windows Remote Code Execution Vulnerability'.

CVSS3: 7.8
msrc
около 5 лет назад

Windows Remote Code Execution Vulnerability

CVSS3: 8.8
fstec
около 5 лет назад

Уязвимость операционной системы Windows, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 97%
0.40477
Средний