{ "id": "CVE-2013-4988", "sourceIdentifier": "cve@mitre.org", "published": "2013-12-13T18:07:51.373", "lastModified": "2024-11-21T01:56:51.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in IcoFX 2.5 and earlier allows remote attackers to execute arbitrary code via a long idCount value in an ICONDIR structure in an ICO file. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Buffer overflow de pila en IcoFX 2.5 y anteriores permite a atacantes remotos ejecutar c\u00f3digo de forma arbitraria a trav\u00e9s de un valor idCount largo en una estructura ICONDIR en un archivo ICO.\nNOTA: Algunos de estos detalles han sido obtenidos de terceras partes." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.5", "matchCriteriaId": "4A644399-B178-4C2D-B581-2F221FF89C30" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "94267A33-6808-4CB0-A88C-EF03BA96CF19" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "68E5004A-9972-4D12-B26E-D9DA3F003DB3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F31C6390-5303-450A-B40F-BA6113755CB3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "2DF9D133-DFDD-47D8-8D1D-9C403B26D6FF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "0741A995-D610-4783-A02E-5C70E3CBA7BE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F68494D-C223-4130-B788-C239D6B4DD40" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A1B7D6B1-F722-4796-AA5B-BCF714D81038" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1F1A18E-14D3-4FFF-995C-C21FAEDFEF95" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D37DC35-36C0-4629-B182-B27092996246" }, { "vulnerable": true, "criteria": "cpe:2.3:a:icofx:icofx:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "02EB38CA-40E2-44C1-A589-FFD8E72E1410" } ] } ] } ], "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0046.html", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://osvdb.org/100826", "source": "cve@mitre.org" }, { "url": "http://packetstormsecurity.com/files/124380/IcoFX-2.5.0.0-Buffer-Overflow.html", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://packetstormsecurity.com/files/162995/IcoFX-2.6-Buffer-Overflow.html", "source": "cve@mitre.org" }, { "url": "http://seclists.org/fulldisclosure/2013/Dec/54", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://secunia.com/advisories/55964", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.coresecurity.com/advisories/icofx-buffer-overflow-vulnerability", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.exploit-db.com/exploits/30208", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.securityfocus.com/bid/64221", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89611", "source": "cve@mitre.org" }, { "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0046.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://osvdb.org/100826", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://packetstormsecurity.com/files/124380/IcoFX-2.5.0.0-Buffer-Overflow.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://packetstormsecurity.com/files/162995/IcoFX-2.6-Buffer-Overflow.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://seclists.org/fulldisclosure/2013/Dec/54", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://secunia.com/advisories/55964", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.coresecurity.com/advisories/icofx-buffer-overflow-vulnerability", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.exploit-db.com/exploits/30208", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.securityfocus.com/bid/64221", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89611", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }