First published: Thu Jan 15 2015(Updated: )
Multiple untrusted search path vulnerabilities in Corel FastFlick allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) igfxcmrt32.dll, (2) ipl.dll, (3) MSPStyleLib.dll, (4) uFioUtil.dll, (5) uhDSPlay.dll, (6) uipl.dll, (7) uvipl.dll, (8) VC1DecDll.dll, or (9) VC1DecDll_SSE3.dll file that is located in the same folder as the file being processed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Corel FastFlick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8398 is considered to have a medium severity due to the potential for local users to execute arbitrary code.
To fix CVE-2014-8398, update to the latest version of Corel FastFlick that addresses these vulnerabilities.
Local users running vulnerable versions of Corel FastFlick are at risk from CVE-2014-8398.
CVE-2014-8398 may allow attackers to conduct DLL hijacking attacks via the exploitation of untrusted search path vulnerabilities.
Yes, successful exploitation of CVE-2014-8398 could lead to arbitrary code execution, potentially compromising the affected system.