1 results (0.006 seconds)
CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

CVE-2021-45423
https://notcve.org/view.php?id=CVE-2021-45423
13 Mar 2023 — A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution. • https://github.com/merces/libpe/issues/35 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •