WinDjView 2.1 might allow user-assisted attackers to execute code via a crafted .djvu file, because of a "User Mode Write AV near NULL" in WinDjView.exe. One threat model is a victim who obtains an untrusted .djvu file from a remote location and issues several user-defined commands.
References
Link | Resource |
---|---|
https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-7894 | Third Party Advisory |
https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-7894 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-7894 - Third Party Advisory |
Information
Published : 2017-07-05 20:29
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7894
Mitre link : CVE-2017-7894
CVE.ORG link : CVE-2017-7894
JSON object : View
Products Affected
windjview_project
- windjview
CWE