CVE-2021-26236

FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:faststone:image_viewer:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:55

Type Values Removed Values Added
References () https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/ - Exploit, Third Party Advisory () https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/ - Exploit, Third Party Advisory
References () https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236 - Exploit, Third Party Advisory () https://voidsec.com/fuzzing-faststone-image-viewer-cve-2021-26236 - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/49660 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/49660 - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2021-03-18 13:15

Updated : 2024-11-21 05:55


NVD link : CVE-2021-26236

Mitre link : CVE-2021-26236

CVE.ORG link : CVE-2021-26236


JSON object : View

Products Affected

faststone

  • image_viewer
CWE
CWE-787

Out-of-bounds Write