FastStone Image Viewer 7.2

CPE Details

FastStone Image Viewer 7.2
7.2
2021-01-27
12h05 +00:00
2021-03-24
16h45 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:faststone:image_viewer:7.2:*:*:*:*:*:*:*

Informations

Vendor

faststone

Product

image_viewer

Version

7.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-36947 2022-08-18 18h58 +00:00 Unsafe Parsing of a PNG tRNS chunk in FastStone Image Viewer through 7.5 results in a stack buffer overflow.
9.8
Critical
CVE-2021-26237 2021-03-18 12h59 +00:00 FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d7d, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
7.8
High
CVE-2021-26235 2021-03-18 12h56 +00:00 FastStone Image Viewer <= 7.5 is affected by a user mode write access violation near NULL at 0x005bdfc9, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
7.8
High
CVE-2021-26234 2021-03-18 12h55 +00:00 FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d8a, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
7.8
High
CVE-2021-26233 2021-03-18 12h53 +00:00 FastStone Image Viewer <= 7.5 is affected by a user mode write access violation near NULL at 0x005bdfcb, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
7.8
High
CVE-2021-26236 2021-03-18 11h55 +00:00 FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file.
7.8
High