7.8
CVSSv3

CVE-2017-7578

Published: 07/04/2017 Updated: 12/04/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple heap-based buffer overflows in parser.c in libming 0.4.7 allow remote malicious users to cause a denial of service (listswf application crash) or possibly have unspecified other impact via a crafted SWF file. NOTE: this issue exists because of an incomplete fix for CVE-2016-9831.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libming libming 0.4.7

Github Repositories

Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"

1 Introduction This directory provides the source code of the paper: "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"[S&P 2022] 2 Run Beacon 21 Environment Prerequisite 211 Set Environment Variable export BEACON=<path_of_beacon_repository> 212 Install Dependent Tools You could run $BEACON/scripts/preinstallsh to install the

directed_fuzzing mjs mjs_mk_string base: 0x1320 target function add, name : 0x1b103,mjs_mk_string CVE-2016-9827(listswf) _iprintf function in outputtxtc base: 0x2240 target function add, name : 0x236d,_iprintf CVE-2017-7578(swftophp) parseSWF_RGBA in parserc base: 0x2250 target function add, name : 0x115c7,parseSWF_RGBA objdump-CVE-2017-8392 _bfd_dwarf2_find_nearest_line bas