Описание
Integer signedness error in RenRen Talk 2.9 allows remote attackers to execute arbitrary code via crafted dimensions of a skin file, leading to a heap-based buffer overflow, as demonstrated using a BMP image.
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:renren:renren_talk:2.9:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.0659
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-189
Связанные уязвимости
github
больше 3 лет назад
Integer signedness error in RenRen Talk 2.9 allows remote attackers to execute arbitrary code via crafted dimensions of a skin file, leading to a heap-based buffer overflow, as demonstrated using a BMP image.
EPSS
Процентиль: 91%
0.0659
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-189