CNVD-2016-00950
Vulnerability from cnvd - Published: 2015-04-23
VLAI Severity ?
Title
PicViewer处理TIFF图片内存破坏漏洞
Description
PicViewer是一款图像浏览工具,支持浏览的格式包括BMP,GIF和JPEG、PNG、TIFF,TGA、PSD和PCD。
PicViewer处理TIFF图片存在内存破坏漏洞,允许攻击者利用此漏洞使应用程序崩溃。
Severity
中
Formal description
重新编写TIFF解析的相关代码。
Impacted products
| Name | anixsoft PicViewer 3.0.2.40 |
|---|
{
"description": "PicViewer\u662f\u4e00\u6b3e\u56fe\u50cf\u6d4f\u89c8\u5de5\u5177,\u652f\u6301\u6d4f\u89c8\u7684\u683c\u5f0f\u5305\u62ecBMP,GIF\u548cJPEG\u3001PNG\u3001TIFF,TGA\u3001PSD\u548cPCD\u3002\r\n\r\nPicViewer\u5904\u7406TIFF\u56fe\u7247\u5b58\u5728\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002",
"discovererName": "\u9648\u601d\u8fdc[\u5929\u878d\u4fe1]",
"formalWay": "\u91cd\u65b0\u7f16\u5199TIFF\u89e3\u6790\u7684\u76f8\u5173\u4ee3\u7801\u3002",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-00950",
"openTime": "2015-04-23",
"products": {
"product": "anixsoft PicViewer 3.0.2.40"
},
"serverity": "\u4e2d",
"submitTime": "2015-03-09",
"title": "PicViewer\u5904\u7406TIFF\u56fe\u7247\u5185\u5b58\u7834\u574f\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…