icon

We found results for “

WS-2016-7083

Good to know:

icon

Date: December 13, 2016

In Kitware/VTK, version v3.2.0 to v7.1.1, there is a buffer overflow vulnerability, as a result of the program trying to capture input into destination array without checking its length first. This issue may allow an attacker to crash the program, or to execute arbitrary code on the system.

Language: C++

Severity Score

Severity Score

Weakness Type (CWE)

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-120

Top Fix

icon

Upgrade Version

Upgrade to version v8.0.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): HIGH

Do you need more information?

Contact Us