Home / CVE DB / CVE-2024-1112
Standard
Vulnerability Identifier

CVE-2024-1112

2024-01-31
Severity Assessment
7.3
HIGH
CVSS v3.x Score
Clinical Analysis (Description)

Heap-based buffer overflow vulnerability in Resource Hacker, developed by Angus Johnson, affecting version 3.6.0.92. This vulnerability could allow an attacker to execute arbitrary code via a long filename argument.

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Impact Consequences

Technical Impact

Unchanged
Scope
High
Confidentiality
High
Integrity
High
Availability
AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Weakness Classification

CWE-CWE-119

Affected Population

Affected Configurations

Total: 1 detected entries

Software List Scrollable
an
resource_hacker
Vendor: angusj • v3.6.0.92
Timeline

Time Line

PUBLICATION
31 Jan 2024
MODIFICATION
21 Nov 2024
Impact Statistics

Key Metrics

CVSS Score
7.3
HIGH
Products
1
Affected
Articles
3
Published
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Associated Cyber Intelligence

Related News Articles

3 article(s) mentioning this vulnerability

Article #1

PHP Security Vulnerabilities Identified

CERT-FR announces multiple PHP vulnerabilities that could allow attackers to cause unspecified security issues as reported by the editor.

7
02 Jan 2026 Vulnerability HIGH
Article #2
8

Critical Security Vulnerabilities Discovered in Red Hat Linux Kernel

Multiple critical vulnerabilities discovered in the Red Hat Linux kernel could be exploited by attackers, posing significant risks to system…

02 Jan 2026 vulnerability CRITICAL
Article #3

Vulnérabilités critiques découvertes dans le noyau Linux Red Hat

Plusieurs vulnérabilités critiques découvertes dans le noyau Linux Red Hat pourraient être exploitées par les attaquants, posant des risques significatifs…

8
02 Jan 2026 vulnérabilité CRITICAL
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.