Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h82r-pj6q-vp4f

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file.

FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file.

EPSS

Процентиль: 72%
0.0074
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.8
nvd
почти 5 лет назад

FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file.

EPSS

Процентиль: 72%
0.0074
Низкий

Дефекты

CWE-787