WinSig.exe in eSignal 10.6.2425 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a long StyleTemplate element in a QUO, SUM or POR file, which triggers a stack-based buffer overflow, or (2) a long Font->FaceName field (aka FaceName element), which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://aluigi.altervista.org/adv/esignal_1-adv.txt | Exploit |
http://secunia.com/advisories/45966 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2011-09-16 14:28
Updated : 2024-02-04 17:54
NVD link : CVE-2011-3494
Mitre link : CVE-2011-3494
CVE.ORG link : CVE-2011-3494
JSON object : View
Products Affected
interactivedata
- esignal
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer