Vulnerability Description
Stack-based buffer overflow in the ERM_convert_to_correct_webpath function in ermapper_u.dll in ERDAS ER Viewer before 13.00.0001 allows remote attackers to execute arbitrary code via a crafted pathname in an ERS file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hexagon | Erdas Er Viewer | <= 11.04 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/51725Vendor Advisory
- http://secunia.com/advisories/51725Vendor Advisory
FAQ
What is CVE-2013-0726?
CVE-2013-0726 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in the ERM_convert_to_correct_webpath function in ermapper_u.dll in ERDAS ER Viewer before 13.00.0001 allows remote attackers to execute arbitrary code via a crafted pathna...
How severe is CVE-2013-0726?
CVE-2013-0726 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-0726?
Check the references section above for vendor advisories and patch information. Affected products include: Hexagon Erdas Er Viewer.