The WPG plugin before 3.1.0.0 for IrfanView 4.57 has a Read Access Violation on Control Flow starting at WPG!ReadWPG_W+0x0000000000000133, which might allow remote attackers to execute arbitrary code.
References
Link | Resource |
---|---|
https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/ | Exploit Third Party Advisory |
https://www.irfanview.com/plugins.htm | Vendor Advisory |
https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/ | Exploit Third Party Advisory |
https://www.irfanview.com/plugins.htm | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-irfanview-wpg/ - Exploit, Third Party Advisory | |
References | () https://www.irfanview.com/plugins.htm - Vendor Advisory |
Information
Published : 2021-02-17 16:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27362
Mitre link : CVE-2021-27362
CVE.ORG link : CVE-2021-27362
JSON object : View
Products Affected
irfanview
- irfanview
- wpg
CWE
CWE-125
Out-of-bounds Read