Описание
Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to "data blocks."
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*
cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*
cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*
cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*
cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*
cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04645
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-119
Связанные уязвимости
github
почти 4 года назад
Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to "data blocks."
EPSS
Процентиль: 89%
0.04645
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-119