Логотип exploitDog
bind:CVE-2017-2790
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-2790

Количество 2

Количество 2

nvd логотип

CVE-2017-2790

почти 9 лет назад

When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy. This results in a heap-based buffer overflow and can lead to code execution under the context of the application.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-8967-365q-pfj7

больше 3 лет назад

When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy. This results in a heap-based buffer overflow and can lead to code execution under the context of the application.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-2790

When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy. This results in a heap-based buffer overflow and can lead to code execution under the context of the application.

CVSS3: 8.8
1%
Низкий
почти 9 лет назад
github логотип
GHSA-8967-365q-pfj7

When processing a record type of 0x3c from a Workbook stream from an Excel file (.xls), JustSystems Ichitaro Office trusts that the size is greater than zero, subtracts one from the length, and uses this result as the size for a memcpy. This results in a heap-based buffer overflow and can lead to code execution under the context of the application.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу