|CVSS SCORE||6.8, (AV:N/AC:M/Au:N/C:P/I:P/A:P)|
The specific flaw exists within the handling of Ghost images. The issue lies in sign-extending byte values from an array before using them as an index into an array, allowing for out-of-bounds access. An attacker can leverage this vulnerability to execute arbitrary code within the context of the current process.
Symantec has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||Steven Seeley of Source Incite