We found results for “”
WS-2016-7083
Good to know:
Date: December 13, 2016
In Kitware/VTK, version v3.2.0 to v7.1.1, there is a buffer overflow vulnerability, as a result of the program trying to capture input into destination array without checking its length first. This issue may allow an attacker to crash the program, or to execute arbitrary code on the system.
Language: C++
Severity Score
Severity Score
Weakness Type (CWE)
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-120Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | HIGH |