Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory.
[ { "source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913", "target": { "file": "src/updatedownloader.cpp" }, "digest": { "line_hashes": [ "256509417063967258358568229748065976355", "59454089042011457857280912392408001448", "235466687894083663880668637713036677341", "44065089312639971686781285615697421049", "67889234838703458489700306438856562673", "149555949355538936170486695210422789571", "335082845600165984944224248505277061033", "199022011612492004326365850404459664368", "173383683836750240036716513681198247082", "145405624881629910402282105170309345037", "91411699622653063031889991693661834118", "272454068616744887573527734074534559476", "228980372664329242796278865801960738036", "289403668701092855358199752394344996320", "148941745934012443053339607565491885353" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "signature_version": "v1", "id": "CVE-2016-7838-3955e3f0" }, { "source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913", "target": { "function": "UpdateDownloader::CleanLeftovers", "file": "src/updatedownloader.cpp" }, "digest": { "function_hash": "134035343244820856887635900161991009007", "length": 402.0 }, "deprecated": false, "signature_type": "Function", "signature_version": "v1", "id": "CVE-2016-7838-44d8ca31" }, { "source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913", "target": { "function": "CreateUniqueTempDirectory", "file": "src/updatedownloader.cpp" }, "digest": { "function_hash": "187456941495623255741455871983620343098", "length": 524.0 }, "deprecated": false, "signature_type": "Function", "signature_version": "v1", "id": "CVE-2016-7838-dc3e4f5e" } ]