漏洞标题
PDF-XChange Editor EMF文件解析基于堆的缓冲区溢出远程代码执行漏洞
漏洞描述信息
PDF-XChange Editor EMF文件解析基于堆的缓冲区溢出远程代码执行漏洞。此漏洞允许远程攻击者在受影响的PDF-XChange Editor安装上执行任意代码。利用此漏洞需要目标用户交互,即目标必须访问恶意页面或打开恶意文件。
具体漏洞存在于EMF文件的解析中。问题在于,在将用户提供的数据复制到固定长度的基于堆的缓冲区之前,缺乏对数据长度的有效验证。攻击者可以利用此漏洞在当前进程的上下文中执行代码。该漏洞被标记为ZDI-CAN-22061。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞类别
堆缓冲区溢出
漏洞标题
PDF-XChange Editor EMF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
漏洞描述信息
PDF-XChange Editor EMF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22061.
CVSS信息
N/A
漏洞类别
堆缓冲区溢出
漏洞标题
PDF-XChange Editor 安全漏洞
漏洞描述信息
PDF-XChange Editor是PDF-XChange公司的一个运行在 Microsoft Windows 系统中的 PDF 文件查看软件。 PDF-XChange Editor 存在安全漏洞,该漏洞源于 EMF File Parsing 基于堆的缓冲区溢出远程代码执行漏洞。
CVSS信息
N/A
漏洞类别
其他