Vulnerability Note VU#813631
Total Commander File Info plugin vulnerable to denial of service via an out-of-bounds read
Total Commander's File Info plugin version 2.21 attempts an out-of-bounds read when reading a file carefully crafted by an attacker.
CWE-125: Out-of-bounds Read - CVE-2015-2869
An attacker that can control the contents of certain file types may be able to cause an out-of-bounds read error in Total Commander File Plugin version 2.21 by specifying overly large values of certain properties. An attacker who successfully exploits this vulnerability may cause the Total Commander application to unexpectedly terminate.
Out-of-bounds reads may allow remote code execution in some circumstances; the CERT/CC is currently unaware of such an attack on the Total Commander File Info plugin, however.
An attacker may be able to cause the application to terminate.
Apply an update
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Total Commander File Info Plugin||Affected||-||16 Jul 2015|
CVSS Metrics (Learn More)
Thanks to Cisco TALOS for reporting this vulnerability to us. Cisco Talos credits Marcin Noga for discovering this vulnerability.
This document was written by Garret Wassermann.
- CVE IDs: CVE-2015-2869
- Date Public: 16 Jul 2015
- Date First Published: 20 Jul 2015
- Date Last Updated: 20 Jul 2015
- Document Revision: 36
If you have feedback, comments, or additional information about this vulnerability, please send us email.