This vulnerability is capable of crashing software, bypass protection mechanism, modify of memory, and successful exploitation may lead to code execution.
The text was updated successfully, but these errors were encountered:
How can an OOB read result in code execution? Please don't copypaste "impact" text that you've found elsewhere into your own reports without demonstrating that it's accurate.
Description
heap-buffer-overflow in function bit_read_RC at bits.c:320
Version
Steps to reproduce
POC
poc_hbo01.bin
Impact
This vulnerability is capable of crashing software, bypass protection mechanism, modify of memory, and successful exploitation may lead to code execution.
The text was updated successfully, but these errors were encountered: