Vulnerability Description
A stack based buffer overflow vulnerability exists in the method receiving data from SysTreeView32 control of the GMER 2.1.19357 application. A specially created long path can lead to a buffer overflow on the stack resulting in code execution. An attacker needs to create path longer than 99 characters to trigger this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gmer | Gmer | 2.1.19357 |
Related Weaknesses (CWE)
References
- http://www.talosintelligence.com/reports/TALOS-2016-0127/ExploitThird Party Advisory
- http://www.talosintelligence.com/reports/TALOS-2016-0127/ExploitThird Party Advisory
FAQ
What is CVE-2016-4289?
CVE-2016-4289 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A stack based buffer overflow vulnerability exists in the method receiving data from SysTreeView32 control of the GMER 2.1.19357 application. A specially created long path can lead to a buffer overflo...
How severe is CVE-2016-4289?
CVE-2016-4289 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4289?
Check the references section above for vendor advisories and patch information. Affected products include: Gmer Gmer.