[原文]Heap-based buffer overflow in WinHex 12.05 SR-14, and possibly other versions, may allow attackers to execute arbitrary code via a long file name argument. NOTE: since this overflow is in the command line of an unprivileged program, it is highly likely that this is not a vulnerability.
X-Ways WinHex contains a flaw that may allow either a Remote or Local denial of service. The issue is triggered when an attacker sends a specially-crafted file name to a buffer causing a heap-based overflow, and will result in loss of availability for the WinHex Application.
This application typically does not run with any elevated privileges and requires command line interaction from a user.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.