First published: Thu Jan 09 2014(Updated: )
Stack-based buffer overflow in Picasa3.exe in Google Picasa before 3.9.0 Build 137.69 might allow remote attackers to execute arbitrary code via a crafted RAW file, as demonstrated using a KDC file with a certain size.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Products | =3.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5359 is classified as a high severity vulnerability due to its potential for remote code execution.
The best way to fix CVE-2013-5359 is to upgrade to Google Picasa version 3.9.0 Build 137.69 or later.
Exploiting CVE-2013-5359 could allow attackers to execute arbitrary code on the affected system.
CVE-2013-5359 affects versions of Google Picasa prior to 3.9.0 Build 137.69.
Yes, CVE-2013-5359 can be exploited via a crafted RAW file, particularly a KDC file of a certain size.