The FileInfo plugin before 2.22 for Ghisler Total Commander allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via (1) a large Size value in the Archive Member Header of a COFF Archive Library file, (2) a large Number Of Symbols value in the 1st Linker Member of a COFF Archive Library file, (3) a large Resource Table Count value in the LE Header of a Linear Executable file, or (4) a large value in a certain Object field in a Resource Table Entry in a Linear Executable file.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/813631 | Third Party Advisory US Government Resource |
http://totalcmd.net/plugring/fileinfo.html | |
http://blogs.cisco.com/security/talos/fileinfo-plugin-dos | |
http://www.securityfocus.com/bid/75955 | |
http://www.securitytracker.com/id/1033004 |
Configurations
Information
Published : 2015-07-21 08:59
Updated : 2017-09-20 18:29
NVD link : CVE-2015-2869
Mitre link : CVE-2015-2869
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
ghisler
- total_commander