Vulnerability Description
Buffer overflow in the CL_vsprintf function in Takumi Yamada DX Library before 3.16 allows remote attackers to execute arbitrary code via a crafted string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dx Library Project | Dx Library | <= 3.15e |
Related Weaknesses (CWE)
References
- http://homepage2.nifty.com/natupaji/DxLib/dxvulnerability.html
- http://jvn.jp/en/jp/JVN49476817/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000001Vendor Advisory
- http://homepage2.nifty.com/natupaji/DxLib/dxvulnerability.html
- http://jvn.jp/en/jp/JVN49476817/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000001Vendor Advisory
FAQ
What is CVE-2016-1131?
CVE-2016-1131 is a vulnerability with a CVSS score of 7.8 (HIGH). Buffer overflow in the CL_vsprintf function in Takumi Yamada DX Library before 3.16 allows remote attackers to execute arbitrary code via a crafted string.
How severe is CVE-2016-1131?
CVE-2016-1131 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1131?
Check the references section above for vendor advisories and patch information. Affected products include: Dx Library Project Dx Library.