Impact
This entry describes an out-of-bounds write vulnerability located in the proton project’s base/poco/Foundation/src modules, specifically involving program files inflate.C. The flaw can corrupt internal data structures, which is a classic memory corruption weakness, identified as CWE-787. If successfully exploited, the attacker may gain the ability to execute arbitrary code or compromise the integrity of the affected application. The description does not provide explicit details on confidentiality or availability impact, but arbitrary code execution is typically severe.
Affected Systems
The vulnerability affects the timeplus-io Proton software, impacting all releases before version 1.6.16. Users running Proton 1.6.15 or earlier are therefore exposed. No additional vendor or system details are listed in the CVE record.
Risk and Exploitability
The CVSS score for this issue is 10, indicating maximum severity. The EPSS score is not available, and the vulnerability is not included in the CISA KEV catalog. An attacker would need to trigger the out-of-bounds write, likely by interacting with the inflate.C component; the exact attack vector is not explicitly stated, so it is inferred that exploitation would require some form of interaction with Proton’s processing of certain inputs. Given the high severity score and absence of mitigation hints, the risk is considered high.
OpenCVE Enrichment