A vulnerability has been discovered in Winhex affecting version 16.1 SR-1 and 20.4. This vulnerability consists of a buffer overflow controlling the Structured Exception Handler (SEH) registers. This could allow attackers to execute arbitrary code via a long filename argument.
CVE Status: Awaiting Analysis
Attribute | Value |
---|---|
Attack Complexity | LOW |
Attack Vector | LOCAL |
Availability Impact | HIGH |
Base Score | 7.3 |
Base Severity | HIGH |
Confidentiality Impact | HIGH |
Integrity Impact | HIGH |
Privileges Required | LOW |
Scope | UNCHANGED |
User Interaction | REQUIRED |
Vector String | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
Exploitability Score | 1.3 |
Impact Score | 5.9 |
Source | [email protected] |
Type | Secondary |