FAQ
What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
FAQ
According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.
FAQ
How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to gain application level execution rights to the system. An attacker could then run a specially crafted application that could exploit the vulnerability to disclose information (AV:L). Alternatively, an attacker could gain access by convincing a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open a specially crafted file.