Description
A stack based buffer overflow vulnerability exists in the method receiving data from SysTreeView32 control of the GMER 2.1.19357 application. A specially created long path can lead to a buffer overflow on the stack resulting in code execution. An attacker needs to create path longer than 99 characters to trigger this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-5289 | A stack based buffer overflow vulnerability exists in the method receiving data from SysTreeView32 control of the GMER 2.1.19357 application. A specially created long path can lead to a buffer overflow on the stack resulting in code execution. An attacker needs to create path longer than 99 characters to trigger this vulnerability. |
References
| Link | Providers |
|---|---|
| http://www.talosintelligence.com/reports/TALOS-2016-0127/ |
|
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T00:25:14.218Z
Reserved: 2016-04-27T00:00:00.000Z
Link: CVE-2016-4289
No data.
Status : Modified
Published: 2019-10-29T19:15:14.097
Modified: 2024-11-21T02:51:48.630
Link: CVE-2016-4289
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD