Stack-based buffer overflow in DataRescue Interactive Disassembler (IDA) Pro 4.7 allows attackers to execute arbitrary code via a PE file with an Import Address Table containing a long import library name.
References
Configurations
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/13980 - | |
References | () http://securitytracker.com/id?1012975 - | |
References | () http://www.datarescue.com/ubb/ultimatebb.php?/topic/2/146.html - Patch, Vendor Advisory | |
References | () http://www.idefense.com/application/poi/display?id=189&type=vulnerabilities - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/12353 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19042 - |
Information
Published : 2005-01-24 05:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0115
Mitre link : CVE-2005-0115
CVE.ORG link : CVE-2005-0115
JSON object : View
Products Affected
datarescue
- ida
CWE