FastStone.Image.Viewer.CUR.File.Stack.Buffere.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in FastStone Image Viewer.
The vulnerability is due to input validation error when processing a crafted Bitmap Info Header in a CUR file. A remote attacker can exploit these vulnerabilities by enticing a target user into opening a crafted CUR file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Affected Products
FastStone Image Viewer version 7.5 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |