Vulnerability Details : CVE-2016-7838
Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory.
Vulnerability category: File inclusionExecute code
Products affected by CVE-2016-7838
- cpe:2.3:a:winsparkle:winsparkle:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7838
0.92%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7838
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2016-7838
-
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7838
-
http://www.securityfocus.com/bid/95099
WinSparkle CVE-2016-7838 Remote Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://www.wireshark.org/news/20161214.html
Wireshark · Wireshark 2.2.3 and 2.0.9 ReleasedVendor Advisory
-
https://jvn.jp/en/jp/JVN96681653/index.html
JVN#96681653: WinSparkle issue where registry value is not validatedThird Party Advisory;VDB Entry
-
https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913
Verify UpdateTempDir isn't maliciously modified · vslavik/winsparkle@bb45485 · GitHubPatch;Third Party Advisory
-
https://jvn.jp/en/jp/JVN90813656/index.html
JVN#90813656: Wireshark for Windows issue where an arbitrary file may be deletedThird Party Advisory;VDB Entry
Jump to