VeryPDF 4.1 has a Memory Overflow leading to Code Execution because pdfocx!CxImageTIF::operator in pdfocx.ocx (used by pdfeditor.exe and pdfcmd.exe) is mishandled.
References
Link | Resource |
---|---|
https://www.vdalabs.com/2019/04/25/microsoft-security-risk-detection-0day-in-verypdf-reader-part-1/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-04-26T13:42:21
Updated: 2019-04-26T13:42:21
Reserved: 2019-04-23T00:00:00
Link: CVE-2019-11493
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-04-26T14:29:00.487
Modified: 2019-04-26T17:54:35.607
Link: CVE-2019-11493
JSON object: View
Redhat Information
No data.
CWE