Vulnerability Details : CVE-2012-4988
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2012-4988
Probability of exploitation activity in the next 30 days: 12.31%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-4988
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-4988
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4988
-
https://www.exploit-db.com/exploits/21741/
XnView 1.99.1 - '.JLS' File Decompression Heap Overflow - Windows dos Exploit
-
http://www.reactionpenetrationtesting.co.uk/xnview-jls-heap.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79030
XnView JPEG-LS buffer overflow CVE-2012-4988 Vulnerability Report
-
http://seclists.org/fulldisclosure/2012/Oct/36
Full Disclosure: XnView JLS File Decompression Heap Overflow
-
http://www.securityfocus.com/bid/55787
XnView JPEG-LS Image Processing Heap Based Buffer Overflow Vulnerability
Products affected by CVE-2012-4988
- cpe:2.3:a:xnview:xnview:1.99:*:*:*:*:*:*:*
- cpe:2.3:a:xnview:xnview:1.99.1:*:*:*:*:*:*:*