CVE-2016-7838

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-7838
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7838.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-7838
Published
2017-06-09T16:29:01Z
Modified
2025-10-21T03:59:02.288906Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Untrusted search path vulnerability in WinSparkle versions prior to 0.5.3 allows remote attackers to execute arbitrary code via a specially crafted executable file in an unspecified directory.

References

Affected packages

Git / github.com/vslavik/winsparkle

Affected ranges

Type
GIT
Repo
https://github.com/vslavik/winsparkle
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1
v0.2
v0.3
v0.4
v0.5
v0.5.1
v0.5.2

Database specific

vanir_signatures

[
    {
        "source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
        "target": {
            "file": "src/updatedownloader.cpp"
        },
        "digest": {
            "line_hashes": [
                "256509417063967258358568229748065976355",
                "59454089042011457857280912392408001448",
                "235466687894083663880668637713036677341",
                "44065089312639971686781285615697421049",
                "67889234838703458489700306438856562673",
                "149555949355538936170486695210422789571",
                "335082845600165984944224248505277061033",
                "199022011612492004326365850404459664368",
                "173383683836750240036716513681198247082",
                "145405624881629910402282105170309345037",
                "91411699622653063031889991693661834118",
                "272454068616744887573527734074534559476",
                "228980372664329242796278865801960738036",
                "289403668701092855358199752394344996320",
                "148941745934012443053339607565491885353"
            ],
            "threshold": 0.9
        },
        "deprecated": false,
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2016-7838-3955e3f0"
    },
    {
        "source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
        "target": {
            "function": "UpdateDownloader::CleanLeftovers",
            "file": "src/updatedownloader.cpp"
        },
        "digest": {
            "function_hash": "134035343244820856887635900161991009007",
            "length": 402.0
        },
        "deprecated": false,
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2016-7838-44d8ca31"
    },
    {
        "source": "https://github.com/vslavik/winsparkle/commit/bb454857348245a7397f9e4fbb3a902f4ac25913",
        "target": {
            "function": "CreateUniqueTempDirectory",
            "file": "src/updatedownloader.cpp"
        },
        "digest": {
            "function_hash": "187456941495623255741455871983620343098",
            "length": 524.0
        },
        "deprecated": false,
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2016-7838-dc3e4f5e"
    }
]