// For flags

CVE-2013-3941

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Xjp2.dll in XnView before 2.13 allows remote attackers to execute arbitrary code via (1) the Csiz parameter in a SIZ marker, which triggers an incorrect memory allocation, or (2) the lqcd field in a QCD marker in a crafted JPEG2000 file, which leads to a heap-based buffer overflow.

En la biblioteca Xjp2.dll en XnView versiones anteriores a la versión 2.13, permite a atacantes remotos ejecutar código arbitrario por medio de (1) el parámetro Csiz en un marcador SIZ, que desencadena una asignación de memoria incorrecta, o (2) el campo lqcd en un marcador QCD en un archivo JPEG2000 diseñado, lo que conlleva a un desbordamiento de búfer en la región heap de la memoria.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-04 CVE Reserved
  • 2020-01-02 CVE Published
  • 2023-10-22 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
References (1)
URL Tag Source
http://secunia.com/advisories/52101 Not Applicable
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xnview
Search vendor "Xnview"
Xnview
Search vendor "Xnview" for product "Xnview"
< 2.13
Search vendor "Xnview" for product "Xnview" and version " < 2.13"
-
Affected