CVE-2016-1131

Published on: 01/07/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:05 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Dx Library from Dx Library Project contain the following vulnerability:

Buffer overflow in the CL_vsprintf function in Takumi Yamada DX Library before 3.16 allows remote attackers to execute arbitrary code via a crafted string.

  • CVE-2016-1131 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
JVN#49476817: DX Library vulnerable to buffer overflow Vendor Advisory
jvn.jp
text/xml
URL Logo JVN JVN#49476817
No Description Provided Vendor Advisory
jvndb.jvn.jp
text/html
URL Logo JVNDB JVNDB-2016-000001
No Description Provided homepage2.nifty.com

Inactive LinkNot Archived
URL Logo CONFIRM homepage2.nifty.com/natupaji/DxLib/dxvulnerability.html

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationDx Library ProjectDx LibraryAllAllAllAll
  • cpe:2.3:a:dx_library_project:dx_library:*:*:*:*:*:*:*:*: