Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory.
[
{
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2016-7838-3955e3f0",
"digest": {
"line_hashes": [
"256509417063967258358568229748065976355",
"59454089042011457857280912392408001448",
"235466687894083663880668637713036677341",
"44065089312639971686781285615697421049",
"67889234838703458489700306438856562673",
"149555949355538936170486695210422789571",
"335082845600165984944224248505277061033",
"199022011612492004326365850404459664368",
"173383683836750240036716513681198247082",
"145405624881629910402282105170309345037",
"91411699622653063031889991693661834118",
"272454068616744887573527734074534559476",
"228980372664329242796278865801960738036",
"289403668701092855358199752394344996320",
"148941745934012443053339607565491885353"
],
"threshold": 0.9
},
"source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
"target": {
"file": "src/updatedownloader.cpp"
},
"deprecated": false
},
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2016-7838-44d8ca31",
"digest": {
"length": 402.0,
"function_hash": "134035343244820856887635900161991009007"
},
"source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
"target": {
"file": "src/updatedownloader.cpp",
"function": "UpdateDownloader::CleanLeftovers"
},
"deprecated": false
},
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2016-7838-dc3e4f5e",
"digest": {
"length": 524.0,
"function_hash": "187456941495623255741455871983620343098"
},
"source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
"target": {
"file": "src/updatedownloader.cpp",
"function": "CreateUniqueTempDirectory"
},
"deprecated": false
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7838.json"