A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file. Related to Data from Faulting Address controls Code Flow starting at Editor!TMethodImplementationIntercept+0x57a3b.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://www.wildbit-soft.fi/software.html | product |
https://github.com/Aurorainfinity/vulnerabilities/blob/master/WildBit_Viewer/tga_file_format.md | third party advisory exploit |