2024-12-08 03:06:42 +00:00

112 lines
3.8 KiB
JSON

{
"id": "CVE-2017-8785",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-05T20:29:03.107",
"lastModified": "2024-11-21T03:34:41.743",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FastStone Image Viewer 6.2 has a \"Data from Faulting Address may be used as a return value\" issue. This issue can be triggered by a malformed JPEG 2000 file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact."
},
{
"lang": "es",
"value": "FastStone Image Viewer versi\u00f3n 6.2, presenta un problema de \"Data from Faulting Address may be used as a return value\" . Este problema puede ser activado con un archivo JPEG 2000 malformado que es manejado inapropiadamente por el archivo FSViewer.exe. Los atacantes podr\u00edan explotar este problema para una DoS (Violaci\u00f3n de Acceso) o posiblemente otro impacto no especificado.versi\u00f3n 6.2, presenta un problema de \"Data from Faulting Address may be used as a return value\" . Este problema puede ser activado con un archivo JPEG 2000 malformado que es manejado inapropiadamente por el archivo FSViewer.exe. Los atacantes podr\u00edan explotar este problema para una DoS (Violaci\u00f3n de Acceso) o posiblemente otro impacto no especificado."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:faststone:image_viewer:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D7F39-6197-414E-A08E-BDD7DA84A5D4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-8785",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-8785",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}