BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

EPS Viewer Buffer Overflow

Disclosed August 28, 2013    Zeroday : 452 days

Vulnerability Description:

A buffer overflow exists within gldll32.dll which is found in EPS Viewer installations. This issue is remotely exploitable by an attacker if they were to specially craft an EPS file, and convince a target to open the file with EPS Viewer 3.2 or earlier.

Vendors:

EPS Viewer

Vulnerable Software/Devices:

EPS Viewer 3.2 and possibly earlier versions

Vulnerability Severity:

High

Exploit Availability:

Publicly Available

Exploit Impact:

Remote Code Execution
Exploitation of these vulnerabilities is possible through the use of methods like phishing attacks, where an attacker convinces a user to open a maliciously crafted attachment with a vulnerable program. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 30595 - EPS Viewer Buffer Overflow (Zero-Day)
  • 30596 - EPS Viewer Buffer Overflow (Zero-Day) - x64

Mitigation:

Avoid opening untrusted EPS files.

Links:

CVE(s):