![]() ![]() Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. A remote attacker can pass specially crafted PDF file, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system. The vulnerability exists due to a boundary error when processing PDF files. The vulnerability allows a remote attacker to execute arbitrary code on the target system. ![]() ![]() CWE-ID: CWE-122 - Heap-based Buffer Overflow ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |