An attacker can craft a specific IdaPro *.i64 file to control the instruction pointer and execute arbitrary code
[
{
"product": "Bindiff",
"vendor": "Google LLC",
"versions": [
{
"lessThan": "7.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
Source | Link |
---|---|
zynamics | www.zynamics.com/bindiff/manual/index.html |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo