Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vvjc-3hh3-ch9p

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.

msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.

EPSS

Процентиль: 93%
0.09589
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 11 лет назад

msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.

EPSS

Процентиль: 93%
0.09589
Низкий

Дефекты

CWE-20