![]() ![]() A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system. The vulnerability exists due to a boundary condition within the nsCodingStateMachine::NextStater() function. The vulnerability exists due to a boundary condition within the CharDistributionAnalysis::HandleOneChar() function. The vulnerability allows a remote attacker to gain access to potentially sensitive information. Is there known malware, which exploits this vulnerability? Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. A remote attacker can trick the victim to open a specially crafted file, trigger a heap-based buffer overflow and execute arbitrary code on the target system. The vulnerability exists due to a boundary error within the Utf8_16_Read::convert() function in UniConversion.cxx. The vulnerability allows a remote attacker to execute arbitrary code on the target system. CWE-ID: CWE-122 - Heap-based Buffer Overflow
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |