Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fm2j-rv8c-3xv3

Опубликовано: 21 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.4

Описание

VariCAD EN up to and including version 2010-2.05 is vulnerable to a stack-based buffer overflow when parsing .dwb drawing files. The application fails to properly validate the length of input data embedded in the file, allowing a crafted .dwb file to overwrite critical memory structures. This flaw can be exploited locally by convincing a user to open a malicious file, resulting in arbitrary code execution.

VariCAD EN up to and including version 2010-2.05 is vulnerable to a stack-based buffer overflow when parsing .dwb drawing files. The application fails to properly validate the length of input data embedded in the file, allowing a crafted .dwb file to overwrite critical memory structures. This flaw can be exploited locally by convincing a user to open a malicious file, resulting in arbitrary code execution.

EPSS

Процентиль: 92%
0.08151
Низкий

8.4 High

CVSS4

Дефекты

CWE-121

Связанные уязвимости

nvd
6 месяцев назад

VariCAD EN up to and including version 2010-2.05 is vulnerable to a stack-based buffer overflow when parsing .dwb drawing files. The application fails to properly validate the length of input data embedded in the file, allowing a crafted .dwb file to overwrite critical memory structures. This flaw can be exploited locally by convincing a user to open a malicious file, resulting in arbitrary code execution.

EPSS

Процентиль: 92%
0.08151
Низкий

8.4 High

CVSS4

Дефекты

CWE-121