CVE-2016-7838

Published on: 06/09/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Winsparkle from Winsparkle contain the following vulnerability:

Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory.

  • CVE-2016-7838 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: WinSparkle - WinSparkle version versions prior to 0.5.3

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
WinSparkle CVE-2016-7838 Remote Security Bypass Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 95099
JVN#96681653: WinSparkle issue where registry value is not validated Third Party Advisory
VDB Entry
jvn.jp
text/xml
URL Logo JVN JVN#96681653
Wireshark · Wireshark 2.2.3 and 2.0.9 Released Vendor Advisory
www.wireshark.org
text/html
URL Logo CONFIRM www.wireshark.org/news/20161214.html
Verify UpdateTempDir isn't maliciously modified · vslavik/[email protected] · GitHub Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913
JVN#90813656: Wireshark for Windows issue where an arbitrary file may be deleted Third Party Advisory
VDB Entry
jvn.jp
text/xml
URL Logo JVN JVN#90813656

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationWinsparkleWinsparkleAllAllAllAll
  • cpe:2.3:a:winsparkle:winsparkle:*:*:*:*:*:*:*:*: