An exploitable stack based buffer overflow vulnerability exists in the ipNameAdd functionality of Iceni Argus Version 6.6.04 (Sep 7 2012) NK - Linux x64 and Version 6.6.04 (Nov 14 2014) NK - Windows x64. A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code execution. An attacker can send/provide malicious pdf file to trigger this vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93936 | |
http://www.talosintelligence.com/reports/2016-TALOS-0202/ | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/93936 | |
http://www.talosintelligence.com/reports/2016-TALOS-0202/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93936 - | |
References | () http://www.talosintelligence.com/reports/2016-TALOS-0202/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
Information
Published : 2016-10-28 20:59
Updated : 2024-11-21 02:59
NVD link : CVE-2016-8335
Mitre link : CVE-2016-8335
CVE.ORG link : CVE-2016-8335
JSON object : View
Products Affected
iceni
- argus
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer