VeryPDF 4.1 has a Memory Overflow leading to Code Execution because pdfocx!CxImageTIF::operator in pdfocx.ocx (used by pdfeditor.exe and pdfcmd.exe) is mishandled.
References
Link | Resource |
---|---|
https://www.vdalabs.com/2019/04/25/microsoft-security-risk-detection-0day-in-verypdf-reader-part-1/ | Exploit Third Party Advisory |
https://www.vdalabs.com/2019/04/25/microsoft-security-risk-detection-0day-in-verypdf-reader-part-1/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vdalabs.com/2019/04/25/microsoft-security-risk-detection-0day-in-verypdf-reader-part-1/ - Exploit, Third Party Advisory |
Information
Published : 2019-04-26 14:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11493
Mitre link : CVE-2019-11493
CVE.ORG link : CVE-2019-11493
JSON object : View
Products Affected
verypdf
- verypdf
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer