
Cloud Vulnerability DB
A community-led vulnerabilities database
A User Mode Write Access Violation (AV) vulnerability exists in ntdll!RtlpCoalesceFreeBlocks+0x268 of WildBit Viewer version 6.6. This vulnerability allows attackers to cause a denial of service (DoS) condition via a crafted TIFF file (AttackerKB, WildBit Software).
The vulnerability occurs due to a User Mode Write Access Violation in the ntdll!RtlpCoalesceFreeBlocks+0x268 component. When processing specially crafted TIFF files, the application attempts to perform a write operation to an invalid memory location, triggering an access violation. The vulnerability has been assigned a CVSS v3 Base Score of 5.5, indicating moderate severity. The attack requires local access and user interaction (AttackerKB).
When successfully exploited, this vulnerability can lead to a denial of service condition, causing the application to crash. The impact is limited to availability, with no direct impact on confidentiality or integrity (AttackerKB).
Users should upgrade to a version newer than WildBit Viewer 6.6. The latest version available is 6.14, which was released on August 23, 2024 (WildBit Software).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."