![]() Where a maliciously crafted BMP file can be used to force Design Review to write outside the bounds of the allocated structure.An attacker could leverage this vulnerability to execute arbitrary code. Where a maliciously crafted PDF file can be used to attempt to free an object that has already been freed.An attacker could then execute arbitrary code when Design Review processes PDF files. ![]()
0 Comments
Leave a Reply. |