Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j9qx-827h-mhvq

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer underflow in Picasa3.exe in Google Picasa before 3.9.0 Build 137.69 allows remote attackers to execute arbitrary code via a crafted JPEG tag that triggers a heap-based buffer overflow, as demonstrated using a Canon RAW CR2 file with a large JPEG tag value and a small size.

Integer underflow in Picasa3.exe in Google Picasa before 3.9.0 Build 137.69 allows remote attackers to execute arbitrary code via a crafted JPEG tag that triggers a heap-based buffer overflow, as demonstrated using a Canon RAW CR2 file with a large JPEG tag value and a small size.

EPSS

Процентиль: 85%
0.02556
Низкий

Дефекты

CWE-119

Связанные уязвимости

nvd
около 12 лет назад

Integer underflow in Picasa3.exe in Google Picasa before 3.9.0 Build 137.69 allows remote attackers to execute arbitrary code via a crafted JPEG tag that triggers a heap-based buffer overflow, as demonstrated using a Canon RAW CR2 file with a large JPEG tag value and a small size.

EPSS

Процентиль: 85%
0.02556
Низкий

Дефекты

CWE-119