3D Visual Enterprise Viewer
The specific flaw exists within the handling of JPEG2000 files. The issue lies in the failure to ensure that index values are within the bounds of an allocated array. An attacker can leverage this vulnerability to execute arbitrary code within the context of the current process.
|Steven Seeley of Source Incite