{"vuid":"VU#813631","idnumber":"813631","name":"Total Commander File Info plugin vulnerable to denial of service via an out-of-bounds read","keywords":["DoS","strncmp","out-of-bounds read","CWE-125"],"overview":"Total Commander's File Info plugin version 2.21 attempts an out-of-bounds read when reading a file carefully crafted by an attacker.","clean_desc":"CWE-125: Out-of-bounds Read - CVE-2015-2869 An attacker that can control the contents of certain file types may be able to cause an out-of-bounds read error in Total Commander File Plugin version 2.21 by specifying overly large values of certain properties. An attacker who successfully exploits this vulnerability may cause the Total Commander application to unexpectedly terminate. This attack has been noted in at least two different file types due to the software's improper use of the strncmp function. COFF Archive Library (.lib) files may be used by specifying overly large values for the 'Size' field of the Archive Member Header or the \"Number Of Symbols\" field in the 1st Linker Member. Linear Executable files may be used by specifying overly large values for the \"Resource Table Count\" field of the LE Header or the \"Object\" field at offset 0x8 from a \"Resource Table Entry\". Out-of-bounds reads may allow remote code execution in some circumstances; the CERT/CC is currently unaware of such an attack on the Total Commander File Info plugin, however.","impact":"An attacker may be able to cause the application to terminate.","resolution":"Apply an update Total Commander File Info plugin has released version 2.22, which addresses this issue. Affected users are encouraged to update as soon as possible","workarounds":"","sysaffected":"","thanks":"Thanks to Cisco TALOS for reporting this vulnerability to us. Cisco Talos credits Marcin Noga for discovering this vulnerability.","author":"This document was written by Garret Wassermann.","public":["http://blogs.cisco.com/security/talos/fileinfo-plugin-dos","http://totalcmd.net/plugring/fileinfo.html"],"cveids":["CVE-2015-2869"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-05-28T20:48:06Z","publicdate":"2015-07-16T00:00:00Z","datefirstpublished":"2015-07-20T14:09:21Z","dateupdated":"2015-07-20T14:16:55Z","revision":37,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"N","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.7","cvss_basevector":"AV:L/AC:M/Au:N/C:N/I:N/A:C","cvss_temporalscore":"3.7","cvss_environmentalscore":"0.9160636288608","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}