BugId OOBR[0x88]+0 7dc.851 @ asdfqwerasdfqwer.exe!2d.x3d+0xA89B summary

BugId: OOBR[0x88]+0 7dc.851
Location: asdfqwerasdfqwer.exe!2d.x3d+0xA89B
Description: Access violation while reading memory at 0x437A5000; at the end of a 136/0x88 bytes heap block at 0x437A4F78. This indicates an Out-Of-Bounds (OOB) access bug was triggered.
Version: acrobat_rt3d_test01.exe: Mon Jul 23 00:19:34 2018 (5B558186) (x86)
2d.x3d: 18.11.20055.27899 (x86)
Security impact: Potentially exploitable security issue that might allow information disclosure and (less likely) arbitrary code execution.
Integrity level: 0x2000 (Medium Integrity; this process appears to not be sandboxed!)
Arguments: ['crashes\\_Slave10_crashes_id_000114_00.tif']

BugId version 2017-12-21 14:02. You may not use this version of BugId for commercial purposes. Please contact the author if you wish to use BugId commercially. Contact and licensing information can be found at the bottom of this report.

Stack

  1. 2d.x3d + 0xA89B (id: 7dc, no function symbol available)
  2. 2d.x3d + 0xA478 (id: 851, no function symbol available)
  3. 2d.x3d + 0x2AA3 (no function symbol available)
  4. rt3d.dll + 0x1076DD (no function symbol available)
  5. rt3d.dll + 0xCACC7 (no function symbol available)
  6. rt3d.dll!GetPicture + 0x2E
  7. acrobat_rt3d_test01.exe + 0x118C (no function symbol available)
  8. acrobat_rt3d_test01.exe + 0x152F (no function symbol available)
  9. acrobat_rt3d_test01.exe + 0x1719 (no function symbol available)
  10. KERNEL32.DLL!BaseThreadInitThunk + 0x24
  11. ntdll.dll!__RtlUserThreadStart + 0x2F
  12. ntdll.dll!_RtlUserThreadStart + 0x1B
⇓ click on the title of a section to open or close it.