WinSig.exe in eSignal 10.6.2425 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a long StyleTemplate element in a QUO, SUM or POR file, which triggers a stack-based buffer overflow, or (2) a long Font->FaceName field (aka FaceName element), which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://aluigi.altervista.org/adv/esignal_1-adv.txt | Exploit |
http://secunia.com/advisories/45966 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2011-09-16 07:28
Updated : 2012-06-19 21:00
NVD link : CVE-2011-3494
Mitre link : CVE-2011-3494
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
interactivedata
- esignal