j00ru has discovered a vulnerability in WinImage, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an input validation error when extracting IMG or ISO files. This can be exploited to extract files to arbitrary directories on the system (e.g. the "All Users" startup folder) via a specially crafted IMG or ISO file containing directory traversal modifiers in a file or a directory name.
NOTE: Other types of image files may also be affected.
The vulnerability is confirmed in version 8.10. Other versions may also be affected.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org